httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From m..@apache.org
Subject cvs commit: httpd-site/xdocs/info security_bulletin_20020617.txt
Date Wed, 19 Jun 2002 14:24:20 GMT
mjc         2002/06/19 07:24:20

  Modified:    docs/info security_bulletin_20020617.txt
               xdocs/info security_bulletin_20020617.txt
  Log:
  Typo
  Obtained from: Joe Orton
  
  Revision  Changes    Path
  1.5       +1 -1      httpd-site/docs/info/security_bulletin_20020617.txt
  
  Index: security_bulletin_20020617.txt
  ===================================================================
  RCS file: /home/cvs/httpd-site/docs/info/security_bulletin_20020617.txt,v
  retrieving revision 1.4
  retrieving revision 1.5
  diff -u -r1.4 -r1.5
  --- security_bulletin_20020617.txt	18 Jun 2002 18:26:57 -0000	1.4
  +++ security_bulletin_20020617.txt	19 Jun 2002 14:24:19 -0000	1.5
  @@ -40,7 +40,7 @@
   more pronounced than on other platforms.
   
   In Apache 2.0 the error condition is correctly detected, so it will not
  -allow an attacker to execure arbitrary code on the server. However
  +allow an attacker to execute arbitrary code on the server. However
   platforms could be using a multithreaded model of multiple concurrent
   requests per child process (although the default preference remains
   multiple processes with a single thread and request per process, and most
  
  
  
  1.5       +1 -1      httpd-site/xdocs/info/security_bulletin_20020617.txt
  
  Index: security_bulletin_20020617.txt
  ===================================================================
  RCS file: /home/cvs/httpd-site/xdocs/info/security_bulletin_20020617.txt,v
  retrieving revision 1.4
  retrieving revision 1.5
  diff -u -r1.4 -r1.5
  --- security_bulletin_20020617.txt	18 Jun 2002 18:26:57 -0000	1.4
  +++ security_bulletin_20020617.txt	19 Jun 2002 14:24:20 -0000	1.5
  @@ -40,7 +40,7 @@
   more pronounced than on other platforms.
   
   In Apache 2.0 the error condition is correctly detected, so it will not
  -allow an attacker to execure arbitrary code on the server. However
  +allow an attacker to execute arbitrary code on the server. However
   platforms could be using a multithreaded model of multiple concurrent
   requests per child process (although the default preference remains
   multiple processes with a single thread and request per process, and most
  
  
  

Mime
View raw message