016: SECURITY FIX: November 13, 2001 A security issue exists in the vi.recover script that may allow an attacker to remove arbitrary zero-length files, regardless of ownership. つう、事でage。
-- ppp.conf default: set log Phase Chat LCP IPCP CCP tun command set redial 15 0 set reconnect 15 10000
pppoe: set device "!/usr/sbin/pppoe -i fxp0" set mtu 1492 # set mtu max 1492 # set mru max 1492 enable lqr set lqrperiod 5 set cd 5 enable dns enable mssfixup set authname XXXXXXXXXXX set authkey XXXXXXXXX set speed sync disable acfcomp protocomp deny acfcomp # add! default HISADDR set dial set login set timeout 0 --
-- ppp.linkup MYADDR: ! sh -c "/sbin/route flush" ! sh -c "/sbin/route add default HISADDR -mtu 1492" --
/* systemwide totals computed every five seconds */ struct vmtotal { u_int16_t t_rq; /* length of the run queue */ u_int16_t t_dw; /* jobs in ``disk wait'' (neg priority) */ u_int16_t t_pw; /* jobs in page wait */ u_int16_t t_sl; /* jobs sleeping in core */ u_int16_t t_sw; /* swapped out runnable/short block jobs */ u_int32_t t_vm; /* total virtual memory */ u_int32_t t_avm; /* active virtual memory */ u_int32_t t_rm; /* total real memory in use */ u_int32_t t_arm; /* active real memory */ u_int32_t t_vmshr; /* shared virtual memory */ u_int32_t t_avmshr; /* active shared virtual memory */ u_int32_t t_rmshr; /* shared real memory */ u_int32_t t_armshr; /* active shared real memory */ u_int32_t t_free; /* free memory pages */ };
012: SECURITY FIX: January 21, 2002 A race condition between the ptrace(2) and execve(2) system calls allows an attacker to modify the memory contents of suid/sgid processes which could lead to compromise of the super-user account. あげ