• PHP
  • Ruby on Rails
  • MySQL
  • Linux
    • SELINUX
    • Fedora
    • debian
  • Apache
  • nginx
  • AJAX
Albertech.net

Category Archives: Debian

PHP Security Update – 1/31/2012

January 31, 2012 12:31 pm / Albertech.net

There is an important Debian update for PHP today to fix a number of vulnerabilities such as regression and buffer overflows. The crypt_blowfish function also had a bug that did not properly handle 8-bit characters, which could lead to passwords being cracked easier. This is one of the larger security fixes for PHP in the past year, so you should update your PHP package immediately.

Package        : php5

Vulnerability  : several

Problem type   : remote

Debian-specific: no

CVE ID         : CVE-2011-1938 CVE-2011-2483 CVE-2011-4566 CVE-2011-4885

CVE-2012-0057

 

A regression was found in the fix for PHP’s XSLT transformations (CVE-2012-0057). Updated packages are now available to address this regression. For reference, the original advisory text follows.

 

Several vulnerabilities have been discovered in PHP, the web scripting language. The Common Vulnerabilities and Exposures project identifies the following issues:

 

CVE-2011-1938

 

The UNIX socket handling allowed attackers to trigger a buffer overflow

via a long path name.

 

CVE-2011-2483

 

The crypt_blowfish function did not properly handle 8-bit characters,

which made it easier for attackers to determine a cleartext password

by using knowledge of a password hash.

 

CVE-2011-4566

 

When used on 32 bit platforms, the exif extension could be used to

trigger an integer overflow in the exif_process_IFD_TAG function

when processing a JPEG file.

 

CVE-2011-4885

 

It was possible to trigger hash collisions predictably when parsing

form parameters, which allows remote attackers to cause a denial of

service by sending many crafted parameters.

 

CVE-2012-0057

 

When applying a crafted XSLT transform, an attacker could write files

to arbitrary places in the filesystem.

 

NOTE: the fix for CVE-2011-2483 required changing the behaviour of this

function: it is now incompatible with some old (wrongly) generated hashes for passwords containing 8-bit characters. See the package NEWS entry for details. This change has not been applied to the Lenny version of PHP.

 

NOTE: at the time of release packages for some architectures are still being built. They will be installed into the archive as soon as they arrive.

 

For the oldstable distribution (lenny), these problems have been fixed in version 5.2.6.dfsg.1-1+lenny15.

 

For the stable distribution (squeeze), these problems have been fixed in version 5.3.3-7+squeeze6.

 

For the testing distribution (wheezy) and unstable distribution (sid), these problems have been fixed in version 5.3.9-1.

 

We recommend that you upgrade your php5 packages.

 

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/

Share this:

  • Facebook
  • Google
  • Twitter
  • Print
  • Email
Posted in: debian, PHP / Tagged: php security

PHPMyAdmin Security Update 1/22/2012

January 22, 2012 9:52 pm / Albertech.net

There is a PHPMyAdmin update today for Debian. It fixes XSS bug in the table tracking feature and an XML import plugin vulnerability.  The stable version of Debian (squeeze) and testing (wheezy) are affected.

Package        : phpmyadmin

Vulnerability  : several

Problem type   : remote

Debian-specific: no

CVE ID         : CVE-2011-1940 CVE-2011-3181 CVE-2011-4107

Debian Bug     : 656247

 

Several vulnerabilities have been discovered in phpMyAdmin, a tool to administer MySQL over the web. The Common Vulnerabilities and Exposures project identifies the following problems:

 

CVE-2011-4107

 

The XML import plugin allowed a remote attacker to read arbitrary

files via XML data containing external entity references.

 

CVE-2011-1940, CVE-2011-3181

 

Cross site scripting was possible in the table tracking feature,

allowing a remote attacker to inject arbitrary web script or HTML

Share this:

  • Facebook
  • Google
  • Twitter
  • Print
  • Email
Posted in: debian / Tagged: phpmyadmin

How to Clear Debian Apt Cache

December 7, 2011 3:38 pm / Albertech.net

If you are running on a server with limited space (e.g. VPS), you might need to manually clear out the Debian apt cache via this command:
apt-get clean

Or, keep the current version of the software:
apt-get autoclean

This will clean the files stored in:
/var/cache/apt/archives/

Share this:

  • Facebook
  • Google
  • Twitter
  • Print
  • Email
Posted in: debian / Tagged: debian

Debian Lenny EOL 2/6/2012

December 6, 2011 3:44 pm / Albertech.net

Debian Lenny EOL in two months. Security support for Debian GNU/Linux 5.0 (code name “lenny”) will end 2/6/2012.  If you are still using Lenny, you should run a distribution update to Squeeze in the next 60 days.

The Debian project released Debian GNU/Linux 6.0 alias “squeeze” on the 6th of February 2011. Users and distributors have been given a one-year timeframe to upgrade their old installations to the current stable release. Hence, the security support for the old release of 5.0 is going to end on the 6th of February 2012 as previously announced.

Source: http://lists.debian.org/debian-security-announce/2011/msg00238.html

Share this:

  • Facebook
  • Google
  • Twitter
  • Print
  • Email
Posted in: debian / Tagged: debian update

Upgrading Debian Lenny to Squeeze with MySQL for row-based-replication

October 28, 2011 5:46 pm / Albertech.net

I completed an upgrade of Debian Lenny to Squeeze on a production database server over the weekend. It went quite well and I had zero downtime thanks to my secondary database servers running in-place. One of the biggest benefits to running Squeeze is that MySQL runs at version 5.1.49. Lenny only supports up to MySQL 5.0.

Row-based-replication is safer to replicate data to other servers since all changes are replicated. Prior to MySQL 5.1.14, updates to the mySQL database were not replicated. They were updated via statements (e.g. GRANT, REVOKE). This can potentially cause data-consistency between the master and slave servers, if one runs a INSERT and SELECT (w/o ORDER BY) as the order of the results will be different. If you had a SQL statement on the MySQL database that ends up erroring out, your slave connection to the master server would stop.

Read More →

Share this:

  • Facebook
  • Google
  • Twitter
  • Print
  • Email
Posted in: debian, MySQL / Tagged: debian, mysql 5.1, row replication, squeeze, upgrade

Post Navigation

← Older Posts
 

Categories

  • AJAX
  • Android
  • Apache
  • Canon Cameras
  • Cloud
  • CMS
  • Computer Mods
  • Conferences
  • Deals
  • debian
  • Fedora
  • Flash
  • Frameworks
  • git
  • Hardware
  • HTML
  • IDE
  • iPhone
  • iPhone App Review
  • jQuery
  • Linux
  • Mac OS X
  • MySQL
  • nginx
  • PHP
  • portfolio
  • Puppet
  • Ruby on Rails
  • Script Reviews
  • SELINUX
  • Software
  • Software Review
  • SQL Server
  • statistics
  • Tech
  • Tomcat
  • Uncategorized
  • VMWARE
  • VPS
  • Windows
  • wordpress
  • Zend Framework

Blogroll

  • DragonAl Flickr
  • Dropbox – Free 2GB Account
  • James' Blog
  • Javascript Compressor
  • PHP Builder Community
  • PHP-Princess.net
  • Rubular – Regular Expression Validator
  • The Scale-Out Blog
  • Tiny MCE

Tags

activation AJAX android antec Apache AWS awstats canon coda codeigniter debian enclosure external free G1 install vmware tools Internet Explorer iphone 5 jquery Linux mx-1 MySQL office 2007 OSX photoshop PHP plugin plugins portfolio redesigned website review rewrite script security SELinux ssh tinymce tutorial upgrade VMWARE vmware server wordpress wordpress mu XSS zend framework
© Copyright 2013 Albertech.net
Infinity Theme by DesignCoral / WordPress
loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.