My Passion Linux and OpenSource

MENU
  • Commands
  • desktop
  • HEALTH
  • LAMP
  • Law
  • Linux
  • SCRIPTING
  • Security
  • STORAGE
  • Technology
  • Tuning
  • Rss Feed
  • Google+
  • Skype
  • Linked In
  • Twitter
  • Email me
  • whatsapp video call for download

    ...

  • Pink Tea save you from extreme winter (snow weather)

    Ingredients Water — 2 cupGreen tea — 2 tablespoonBaking soda — 1 pinchGreen...

  • switch user (su -) not working.

    Problem:- Switch user or su – was not working, because /bin/su permission was wrong, by...

  • Windows Software shortcuts

    Shortcuts for Windows base softwares. MS-Word.http://linuxmylife.com/word-doc.PDF...

  • /bin/rm: Argument list too long

    Oct 11 | Commands, Linux | Noman | 2915 Views | with No Comments

    Problem No #1

    I was deleting files from our server having total file count more than 2000000. I was getting below warning.

    Continue Reading

    Read More »
  • Linux Performance tuning benchmark

    Oct 11 | Linux, STORAGE, Tuning | Noman | 2844 Views | with No Comments

    Today. I use three I/O scheduler in Linux and insert 5 Millions record in mysql database.

    Here is the detail which i observe.

    Continue Reading

    Read More »
  • Fix skype sound problem on Fedora 20

    Oct 11 | desktop, Linux | Noman | 3905 Views | with No Comments

    Problem:

    Skype sound was not working on Fedora 20. It seems something wrong with pulseaudio.

    Resolution:

    1. First close skype.

    2. Install below softwares

    # yum install alsa-lib.i686 fontconfig.i686 freetype.i686 glib2.i686 libSM.i686 libXScrnSaver.i686 libXi.i686 libXrandr.i686 libXrender.i686 libXv.i686 libstdc++.i686 pulseaudio-libs.i686 qt.i686 qt-x11.i686 zlib.i686 qtwebkit.i686

    Continue Reading

    Read More »
  • imjournal messages lost due to rate-limiting

    Oct 10 | Linux | Noman | 11728 Views | with No Comments

    Hello,

    I am getting warning “imjournal: 208296 messages lost due to rate-limiting”, after that i have restarted rsyslog service but no luck, after sometime logs are not updating in server.

    Then after some struggle. I fix the problem. Please see below the resolution method.

    [log]

    Oct 10 00:01:22 myprox-server2 dbus-daemon: dbus[581]: [system] Rejected send message, 3 matched rules; type=”method_call”, sender=”:1.103″ (uid=42 pid=2688 comm=”/usr/libexec/mission-control-5 “) interface=”org.freedesktop.NetworkManager” member=”GetPermissions” error name=”(unset)” requested_reply=”0″ destination=”org.freedesktop.NetworkManager” (uid=0 pid=576 comm=”/usr/sbin/NetworkManager –no-daemon “)

    Continue Reading

    Read More »
  • shellshock-exploit-and-fix-cve-2014-6271-cve-2014-7169

    Sep 26 | Security | Noman | 2847 Views | with No Comments

    What is CVE-2014-7169?

    GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

     

    What is CVE-2014-6271?

    GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka “ShellShock.” NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

    source

    http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169
    http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271

     

    How to  fix Shellshock bash exploit.

    Login into your server with root.

    1. First run below command to check your server is vulnerable or not.

    [root1@server80 ~]$ env x='() { :;}; echo vulnerable’ bash -c “echo this is a test”
    vulnerable
    this is a test

    2. yum update bash

    Continue Reading

    Read More »
« Previous 1 … 3 4 5 … 8 Next »
Copyrighted.com Registered & Protected 
ICDS-VOLP-U8CX-ATDM

Powered by Wordpress. Designed by Themnific™