Author Archives: Paul Norton

FEB 2016 CRITICAL SECURITY PATCH – glibc

Red Hat has released a very important patch for a new glibc vulnerability which affects all servers and services running on Red Hat or CentOS 6 and 7. This patch should be applied as soon as possible. This patch is … Continue reading

Posted in Uncategorized | Leave a comment

CentOS 6.7

CentOS 6.7 has been released! Read the Release Notes here.

Posted in Uncategorized | Leave a comment

July 2015 OpenSSL Vulnerability – CVE-2015-1793

“No Red Hat products are affected by the CVE-2015-1793 flaw. No actions need to be performed to fix or mitigate this issue in any way.” This would also include CentOS 4/5/6/7. More info from Red Hat here.

Posted in Uncategorized | Leave a comment

Disks sda, sdb contains BIOS RAID metadata, but are not part of any recognized BIOS RAID sets.

When trying to install CentOS or Red Hat Linux, you may come upon this error message – “Disks sda, sdb contains BIOS RAID metadata, but are not part of any recognized BIOS RAID sets. Ignoring disks sda, sdb”. This may … Continue reading

Posted in Uncategorized | Leave a comment

Serious vulnerability affecting all Linux systems

Details on a serious bug in the Bash shell found on most Linux and Unix systems was made public today. Red Hat published a detailed article about the issue today. To patch your Red Hat systems (RHEL, CentOS, Fedora, etc.) … Continue reading

Posted in Uncategorized | Leave a comment

RHEL 5.11 Released

Read the Release Notes here. The Technical Notes can be found here.

Posted in Uncategorized | Leave a comment

Official Heartbleed Knowledge Base Article from Red Hat

https://access.redhat.com/site/solutions/781793

Posted in Uncategorized | Leave a comment

OpenSSL Heartbleed bug fix for RedHat and CentOS systems

RedHat has released an updated OpenSSL package to fix the Heartbleed bug in RedHat/CentOS 6.x systems. This bug does not affect RedHat/CentOS 5.x systems. You can read about this release here. First, you should clean Yum to ensure that you … Continue reading

Posted in Uncategorized | Leave a comment

Operation Windigo

Research data on the Operation Windigo Linux Malware and how to detect and clean infected systems – http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf

Posted in Uncategorized | Comments Off on Operation Windigo

How to run commands as another user

This will allow you to run a command for any user, including those that don’t have set shells. This is particularly useful for testing a command as the Apache user. The syntax is as follows: su -s $SHELL $USER -c … Continue reading

Posted in Uncategorized | Comments Off on How to run commands as another user