I don't think PERL5LIB can be added to the suexec safe list. The goal
of suexec is to protect users from a malicious/compromised httpd, but if
httpd can set PERL5LIB, it can run arbitrary code as the user.
I would like there to be a solution for this, but it needs to be handled
on the Perl side.
Package: apache2
Version: 2.2.3-4
Severity: wishlist
I was recently burned by the fact suEXEC removes PERL5LIB from
processes' environment: http://httpd.apache.org/docs/2.2/suexec.html
I use SetEnv PERL5LIB ... to get CGIs loading perl modules from my home
directory. This works without suEXEC, bu
2 matches
Mail list logo