Problem No #1
I was deleting files from our server having total file count more than 2000000. I was getting below warning.
Read More »Today. I use three I/O scheduler in Linux and insert 5 Millions record in mysql database.
Here is the detail which i observe.
Read More »Problem:
Skype sound was not working on Fedora 20. It seems something wrong with pulseaudio.
Resolution:
1. First close skype.
2. Install below softwares
# yum install alsa-lib.i686 fontconfig.i686 freetype.i686 glib2.i686 libSM.i686 libXScrnSaver.i686 libXi.i686 libXrandr.i686 libXrender.i686 libXv.i686 libstdc++.i686 pulseaudio-libs.i686 qt.i686 qt-x11.i686 zlib.i686 qtwebkit.i686
Read More »Hello,
I am getting warning “imjournal: 208296 messages lost due to rate-limiting”, after that i have restarted rsyslog service but no luck, after sometime logs are not updating in server.
Then after some struggle. I fix the problem. Please see below the resolution method.
[log]
Oct 10 00:01:22 myprox-server2 dbus-daemon: dbus[581]: [system] Rejected send message, 3 matched rules; type=”method_call”, sender=”:1.103″ (uid=42 pid=2688 comm=”/usr/libexec/mission-control-5 “) interface=”org.freedesktop.NetworkManager” member=”GetPermissions” error name=”(unset)” requested_reply=”0″ destination=”org.freedesktop.NetworkManager” (uid=0 pid=576 comm=”/usr/sbin/NetworkManager –no-daemon “)
Read More »GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka “ShellShock.” NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
source
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271
How to fix Shellshock bash exploit.
Login into your server with root.
1. First run below command to check your server is vulnerable or not.
[root1@server80 ~]$ env x='() { :;}; echo vulnerable’ bash -c “echo this is a test”
vulnerable
this is a test
2. yum update bash
Read More »