A.J. Loonstra wrote:
I tried modifying the exploit not to use /dev/shm... but this is wat
happens:
~$ ./a.out
[+] SLAB cleanup
child 1 VMAs 287
[+] moved stack bfffe000, task_size=0xc000, map_base=0xbf80
[+] vmalloc area 0xc500 - 0xc9d17000
Wait... |
[+] race won maps=6768
afaik, its because the owner of the folder the file is located is has w
permission.
I could be wrong, but I was thinking about this myself a few days ago.
dekkker wrote:
Hi all,
I'm seriously troubled by behaviour of my system I just encountered:
If i do (as root):
touch /home/user/a
Then (as
I have been seeing a few (quite a few.. due to the amount of lists I am
subscribed to) messages in my postfix log's about
murphy.debian.org[146.82.138.6] being blocked due to being present in
spamhaus.org's SBL list.
Going to spamhaus and entering 146.82.138.6 shows that it isn't in fact
in
Can people please be more careful when creating new messages, not to hit
reply to a message then removing everything starting again.
This does play up with clients that follow standards and do threading
through headers passed on by other compliant clients, rather than just
threading as-per
4 matches
Mail list logo