Information on CVE-2015-0235 (GHOST) Vulnerability for Red Hat and CentOS

A vulnerability found in the glibc library, specifically a flaw affecting the gethostbyname() and gethostbyname2() function calls, that allows a remote attacker to potentially execute arbitrary code. CentOS 5, CentOS 6, and CentOS 7 are potentially affected, thus we want to highlight the following information.

Liquid Web package repositories have been updated. Many servers (barring those with updates disabled) have received an update that patches this vulnerability, however, a reboot will still be required in those cases.

Continue reading “Information on CVE-2015-0235 (GHOST) Vulnerability for Red Hat and CentOS”

How to Update the glibc (GNU libc) in CentOS / Red Hat

Updating glibc on Red Hat Linux or CentOS Linux is a very simple process. Most commonly you will use the following command in the case of a security vulnerability, or perhaps just to verify that you’re running the most up-to-date library:

Continue reading “How to Update the glibc (GNU libc) in CentOS / Red Hat”

How to Check the glibc (GNU libc) Version on CentOS 6 and CentOS 7

Pre-Flight Check
  • These instructions are intended specifically for checking the installed version of glibc.
  • I’ll be working from a Liquid Web Core Managed CentOS 6 and CentOS 7 server, and I’ll be logged in as root.

Continue reading “How to Check the glibc (GNU libc) Version on CentOS 6 and CentOS 7”

Information on CVE-2014-9322 Vulnerability for Red Hat and CentOS

A vulnerability found in the Linux kernel, specifically a flaw in fault handling associated with the Stack Segment (SS), allows an unprivileged user to potentially gain privileges. CentOS 4, CentOS 5, CentOS 6, and CentOS 7 are potentially affected, thus we want to highlight the following information.
Continue reading “Information on CVE-2014-9322 Vulnerability for Red Hat and CentOS”

How to Stop and Disable Firewalld on Fedora 21

It is highly recommended that you have another firewall protecting your network or server before, or immediately after, disabling firewalld.

Pre-Flight Check

  • These instructions are intended specifically for stopping and disabling firewalld on Fedora 21.
  • I’ll be working from a Liquid Web Self Managed Fedora 21 server, and I’ll be logged in as root.

Continue reading “How to Stop and Disable Firewalld on Fedora 21”

How to Start and Enable Firewalld on Fedora 21

It is highly recommended that you have a firewall protecting your server.

Pre-Flight Check

  • These instructions are intended specifically for enabling and starting firewalld on Fedora 21.
  • I’ll be working from a Liquid Web Self Managed Fedora 21 server, and I’ll be logged in as root.

Continue reading “How to Start and Enable Firewalld on Fedora 21”

How to Stop and Disable Firewalld on Fedora 20

It is highly recommended that you have another firewall protecting your network or server before, or immediately after, disabling firewalld.
Pre-Flight Check
  • These instructions are intended specifically for stopping and disabling firewalld Fedora 20.
  • I’ll be working from a Liquid Web Self Managed Fedora 20 server, and I’ll be logged in as root.

Continue reading “How to Stop and Disable Firewalld on Fedora 20”

How to Start and Enable Firewalld on Fedora 20

It is highly recommended that you have a firewall protecting your server.
Pre-Flight Check
  • These instructions are intended specifically for enabling and starting firewalld Fedora 20.
  • I’ll be working from a Liquid Web Self Managed Fedora 20 server, and I’ll be logged in as root.

Continue reading “How to Start and Enable Firewalld on Fedora 20”

How to Disable SSLv3 for Exim and Protect Your WHM/cPanel Server from POODLE

Your Guide to POODLE and WHM/cPanel
I. How to Disable SSLv3 for Apache and Protect Your WHM/cPanel Server from POODLE
II. How to Disable SSLv3 for Exim and Protect Your WHM/cPanel Server from POODLE

There’s a new POODLE in town, but unfortunately it’s not the kind of pooch you want around. POODLE stands for Padding Oracle On Downgraded Legacy Encryption. It’s an exploit that, although not considered to be as serious as Heartbleed, is one that should still be protected against. For more information read the Google Blog.

Fortunately, protecting your WHM/cPanel server is easy. Just follow the steps below:

Continue reading “How to Disable SSLv3 for Exim and Protect Your WHM/cPanel Server from POODLE”