Enrico Sorcinelli <[EMAIL PROTECTED]> writes:
> Hi all,
>
> I just published the slides of the two mod_perl talks I gave I gave at the 2nd
these are powerful talks!
> > Italian Perl Workshop on June 2005 (http://www.perl.it/workshop)
>
> - "Building a real web application with HTML::Mason"
> htt
Enno <[EMAIL PROTECTED]> writes:
> as far as I know, that uselib vulnerability has nothing to do with
> mod_perl. it's a kernel exploit. using a different user wont fix the
> problem, updating your kernel will. so why not do that?
I wish I could give you a link, but I cant find it. However, the
k
Geoffrey Young <[EMAIL PROTECTED]> writes:
>>Unfortunately, we have been hit by a [2]uselib() privilege elevation
>>exploit. As a result, our sysadmins have decided that any CGI/mod_perl
>>process has to run as a specific user instead of as www-data.
>
> I'll admit to not being the bes
Hi,
_
Background of Problem
At our [1]webhosting cooperative, each website is setup in a virtual
host like this:
ServerName www.livingcosmos.org
ErrorLog /var/log/apache/www.livingcosmo
NEW FUNCTIONALITY (Cameron Prince, Terrence Brannon)
* Full SQL Query input via the !Query option to Search()
* added the '$makesql' flag to Search() so that generated SQL can
be returned instead of executed. It will remain undocumented until
it is supported for Update(), Delete(),