≡ Menu

root user

The Adobe Flash Player plugin is use for viewing multimedia, and streaming video and audio, on a Firefox web browser. The same plugin is used by Google chrome and other browsers. Keeping your third-party plugins such as flash player up to date helps Firefox run safely and smoothly.
[click to continue…]

By default vSphere does not provide client for Linux or OS X. You need to use Windows system to manage your VMware ESX server. However, it does provides vSphere Web Access which allows you to organize and share virtual machines using web browser. If you try to access vSphere Web Access you may get an error which read as follows:

503 Service Unavailable

You can fix this problem as follows.
[click to continue…]

I've already written about Linux process accounting under Linux ( see how to keep a detailed audit trail of what's being done on your Linux systems). You can easily setup process accounting under FreeBSD.

FreeBSD Process Accounting

FreeBSD process accounting is a security method in which you can keep track of system resources used, their allocation among users, provide for system monitoring, and minimally track a user's commands.
[click to continue…]

RHEL5: Linux Kernel kexec-tools bug fix update

An updated kexec-tools package that fixes a bug is now available for RHEL systems. The kexec-tools package provides tools that facilitate a new kernel to boot using the Linux kernel kexec feature, either on a normal or a panic reboot. Users of kexec-tools are advised to upgrade to this updated package, which resolves the following issue:

bt: unwind: failed to locate return link
makedumpfile corrupts vmcore on ia64: crash's bt fails to unwind

How do I fix this issue?

Type the following command as root user:
# yum update

How To Upgrade CentOS Linux To Version 5.2

CentOS Linux 5.2 has been released and available for immediate update via yum command or
the i386 and x86_64 Architectures. From the announcement page:

CentOS-5.2 is based on the upstream release EL 5.2.0, and includes packages from all variants including Server and Client. All upstream repositories have been combined into one, to make it easier for end users to work with. And the option to further enable external repositories at install time is now available in the installer.

How do I update from CentOS-5.0 and 5.1 to 5.2?

Simply type the following command as root user:
# yum update
# yum upgrade
Sample output:

shadow-utils-4.0.17-13.el 100% |=========================|  50 kB    00:00
---> Package shadow-utils.i386 2:4.0.17-13.el5 set to be updated
---> Downloading header for cups to pack into transaction set.
cups-1.2.4-11.18.el5_2.1. 100% |=========================| 165 kB    00:00
Transaction Summary
Install      8 Package(s)
Update     191 Package(s)
Remove       2 Package(s)
Total download size: 298 M
Is this ok [y/N]: y

Finally, reboot your computer, enter:
# reboot

Cacti is an open source, web-based graphing tool designed as a frontend to RRDtool's data storage and graphing functionality. Cacti allows a user to poll services at predetermined intervals and graph the resulting data. It is generally used to graph time-series data like CPU load and bandwidth use. A common usage is to query network switch or router interfaces via SNMP to monitor network traffic.

It was discovered that Cacti, a systems and services monitoring frontend, performed insufficient input sanitising, leading to cross site scripting and SQL injection being possible.

Since the previous security update, the cacti package could no longer be rebuilt from the source package. This update corrects that problem. Note that this problem does not affect regular use of the provided binary packages (.deb).

=> Package : cacti
=> Vulnerability : insufficient input sanitising
=> Problem type : remote
=> Debian-specific: no
=> CVE Id(s) : CVE-2008-0783 CVE-2008-0785

How do I fix Cacti packages fix regression issues?

Simply type the following two commands as root user:
# apt-get update
# apt-get upgrade

An unpatched security hole in phpMyAdmin can be exploited by malicious people to conduct cross-site scripting attacks under FreeBSD. This also applies to phpmyadmin version under other UNIX like oses.

Input passed via unspecified parameters to files in /libraries is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.

Successful exploitation requires that "register_globals" is enabled and support for ".htaccess" files is disabled.

How do I fix this issue under FreeBSD?

Login as root user and type the following two commands:
# portsnap fetch extract
# portuprade -a