peass-ng / PEASS-ng

PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
https://book.hacktricks.xyz
Other
15.73k stars 3.05k forks source link

sed: -e expression: unknown option to `s' #275

Closed securitytime closed 2 years ago

securitytime commented 2 years ago

If you are going to suggest something, please remove the following template.

Issue description

╔══════════╣ Unmounted file-system?
╚ Check if you can mount umounted devices                                                                                                                                                                   
sed: -e expression #1, char 306: unknown option to `s' 

and

╔══════════╣ Executing Linux Exploit Suggester
╚ https://github.com/mzet-/linux-exploit-suggester                                                                                                                                                          
sed: -e expression #1, char 27: unknown option to `s'

This is the sed version on the affected system:

$ sed --version
sed --version
sed (GNU sed) 4.7
Packaged by Debian
Copyright (C) 2018 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <https://gnu.org/licenses/gpl.html>.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

Written by Jay Fenlason, Tom Lord, Ken Pizzini,
Paolo Bonzini, Jim Meyering, and Assaf Gordon.
GNU sed home page: <https://www.gnu.org/software/sed/>.
General help using GNU software: <https://www.gnu.org/gethelp/>.
E-mail bug reports to: <bug-sed@gnu.org>.

Steps to reproduce the issue

  1. Run linpeas.sh on Ubuntu 20.04 (see below)

Which parameters did you use for executing the script and how did you execute it?

bash linpeas.sh

If winpeas, did you use a clean or obfuscated winpeas, and for which architecture?

Is there any AV / Threat protection in the system?

Please, indicate the OS, the OS version, and the kernel version (build number in case of Windows)

Linux version 5.4.0-77-generic (buildd@lgw01-amd64-028) (gcc version 9.3.0 (Ubuntu 9.3.0-17ubuntu1~20.04)) #86-Ubuntu SMP Thu Jun 17 02:35:03 UTC 2021                                                      
Distributor ID: Ubuntu
Description:    Ubuntu 20.04.2 LTS
Release:        20.04
Codename:       focal

Please, indicate the check that is failing and add a screenshot showing the problem

How did you expect it to work?

Additional details / screenshot

carlospolop commented 2 years ago

Hi @securitytime, Thanks for reporting those bugs. They should be fixed in the following release (in 1-2 hours). Feel free to test them with those releases!