Pardus: Arts: Libltdl Code Injection


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Pardus: Arts: Libltdl Code Injection
# 1  
Old 12-30-2009
Pardus: Arts: Libltdl Code Injection

LinuxSecurity.com: A vulnerability was found in arts, which can be exploited by malicious people to possibly execute arbitrary code.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

5 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Making a script secure to code injection

Heyas I've been told my scipts would be insecure, and to fix that. Figured i might rethink some parts of my coding style, meanwhile i tried to write an additional catcher. After reading: fail : Security Issues - didnt help too much, infact - it confused me even more. n/a:... (8 Replies)
Discussion started by: sea
8 Replies

2. Red Hat

Cause PCIe error callbacks using AER injection

I am trying to cause a callback in the Linux nvme driver by using AER injection. I've modified the AER source code to directly inject errors through module loading rather than from userland program. I've verified that I got the correct bus, dev, and fn and that the error injection went... (0 Replies)
Discussion started by: Decrypto
0 Replies

3. Shell Programming and Scripting

SQL Injection Detection

I want to grep/awk /var/log/httpd/mysite-access_log.log and check if 2 words from the following appear in a single line: benchmark union information_schema drop truncate group_concat into file case hex lpad group order having insert union select from (12 Replies)
Discussion started by: koutroul
12 Replies

4. OS X (Apple)

Code injection

Im needing to create a postinst script for a debian package. I need it to search for this line of script in a plist file located at /folder/folder/folder/folder/folder/file.plist <key>TESTKEYLINE</key> <true/> and after it create a new line and insert this code <key>KEYNAME</key>... (0 Replies)
Discussion started by: iModdr
0 Replies

5. Shell Programming and Scripting

javascript injection

Please advise a script to get rid of the following code which is infected in a large number of files ( in particular php and html files ) <div id="testws35fdgh"></div> <script language="JavaScript"> var0 = "\x69\x3c\x33\x27\x34\x38\x30\x75\x3b\x34"; var1 =... (20 Replies)
Discussion started by: fed.linuxgossip
20 Replies
Login or Register to Ask a Question
Moose::Meta::Attribute::Native::Trait::Code(3pm)	User Contributed Perl Documentation	  Moose::Meta::Attribute::Native::Trait::Code(3pm)

NAME
Moose::Meta::Attribute::Native::Trait::Code - Helper trait for CodeRef attributes VERSION
version 2.0603 SYNOPSIS
package Foo; use Moose; has 'callback' => ( traits => ['Code'], is => 'ro', isa => 'CodeRef', default => sub { sub { print "called" } }, handles => { call => 'execute', }, ); my $foo = Foo->new; $foo->call; # prints "called" DESCRIPTION
This trait provides native delegation methods for code references. DEFAULT TYPE
If you don't provide an "isa" value for your attribute, it will default to "CodeRef". PROVIDED METHODS
o execute(@args) Calls the coderef with the given args. o execute_method(@args) Calls the coderef with the the instance as invocant and given args. BUGS
See "BUGS" in Moose for details on reporting bugs. AUTHOR
Moose is maintained by the Moose Cabal, along with the help of many contributors. See "CABAL" in Moose and "CONTRIBUTORS" in Moose for details. COPYRIGHT AND LICENSE
This software is copyright (c) 2012 by Infinity Interactive, Inc.. This is free software; you can redistribute it and/or modify it under the same terms as the Perl 5 programming language system itself. perl v5.14.2 2012-06-28 Moose::Meta::Attribute::Native::Trait::Code(3pm)