Server Buddies
Server Buddies info@serverbuddies.com Server Management LiveZilla Live Help
English
Eng
Server Management Spanish
Spa
Providing Dedicated Server Solutions Just a Click AWAY
Home
Services
Order
Support
News
Contact Us
About Us
server management Server Tweaking Server Monitoring HelpDesk Support Security Audit
Empty
Cpanel Support
Plesk Support
Ensim Support
Webmin Support
Directadmin Support
Empty
We Accept
We accept Visa, Mastercard, Discover and American Express credit cards.
Paypal is also accepted. The email address to use to make PayPal payment to us is:
order@serverbuddies.com
Paypal Accepted Paypal Accepted
2Checkout Accepted
30-Day MoneyBack Guarantee!


Empty
Testimonials
This turned out to be more of a training lesson in Security. ServerBuddies could have done it by theirself but was nice enough to chat me through it so I could understand exactly what was involved. They knew all the answers to my questions and were patient with me while I tried to finally get it. If you are looking for an excellent provider, you canít go wrong with ServerBuddies. Thanks!
AidMedia Solutions.
See more reviews
Empty
News

Red Hat Security Advisory Important: systemtap security update

11-24-2010
SystemTap is an instrumentation system for systems running the Linux kernel, version 2.6. Developers can write scripts to collect data on the operation of the system. staprun, the SystemTap runtime tool, is used for managing SystemTap kernel modules (for example, loading them).

Updated systemtap packages that fix two security issues are now available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.

It was discovered that staprun did not properly sanitize the environment before executing the modprobe command to load an additional kernel module. A local, unprivileged user could use this flaw to escalate their privileges. (CVE-2010-4170)

Note: After installing the update, users already in the stapdev group must be added to the stapusr group in order to be able to run the staprun tool. SystemTap users should upgrade to these updated packages, which contain backported patches to correct these issues.

Solution
:

Before applying the update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network.

Advisory URL:      https://rhn.redhat.com/errata/RHSA-2010-0894.html
Remember, we listen to you! Any comments/suggestions should be sent to info@serverbuddies.com.

 
RedHat Support Debian Support Gentoo Linux Support FreeBSD Support Fedora Support Ubuntu Support CentOS Support SuSe Support
Home | Services | Order | Support | News | About Us | Contact | Site Map | Refund & Privacy Policy | Blog