Displaying 4 results from an estimated 4 matches for "0c6f".
Did you mean:
016f
2006 Jan 11
5
FreeBSD Security Advisory FreeBSD-SA-06:01.texindex
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-06:01.texindex Security Advisory
The FreeBSD Project
Topic: Texindex temporary file privilege escalation
Category: contrib
Module: texinfo
2004 Sep 12
0
stdout flush
...n, or I am doing something
wrong.
A little patch that puts that fflush in is attached.
Please send mail directly me, as I am not subscribed to this list.
Regards,
Kojedzinszky Richard
TvNetWork Rt.
E-mail: krichy at tvnetwork.hu
PGP: 0x24E79141
Fingerprint = 6847 ECFF EF58 0C09 18A5 16CF 270F 0C6F 24E7 9141
-------------- next part --------------
--- openssh-3.9p1/session.c.orig Wed Sep 1 16:36:39 2004
+++ openssh-3.9p1/session.c Wed Sep 1 16:50:16 2004
@@ -1521,6 +1521,11 @@
else
shell0 = shell;
+ /* flush all output streams to get
+ * everything written on the terminal
+ * like...
2004 Dec 01
1
FreeBSD Security Advisory FreeBSD-SA-04:17.procfs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-04:17.procfs Security Advisory
The FreeBSD Project
Topic: Kernel memory disclosure in procfs and linprocfs
Category: core
Module: sys
Announced:
2004 Dec 16
2
Strange command histories in hacked shell server
Hi,
Sorry for cross posting.
I have with FreeBSD 5.3-stable server which serves as a public shell server.
FreeBSD public.ub.mng.net 5.3-STABLE FreeBSD 5.3-STABLE #6: Wed Nov 24
15:55:36 ULAT 2004 tsgan@public.ub.mng.net:/usr/obj/usr/src/sys/PSH i386
It has ssh and proftp-1.2.10 daemons.
However it was hacked and I'm trying to analyze it and having some
difficulties.
Machine is