Return-Path: Delivered-To: apmail-httpd-cvs-archive@www.apache.org Received: (qmail 50239 invoked from network); 16 Apr 2009 15:41:21 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 16 Apr 2009 15:41:21 -0000 Received: (qmail 87128 invoked by uid 500); 16 Apr 2009 15:41:20 -0000 Delivered-To: apmail-httpd-cvs-archive@httpd.apache.org Received: (qmail 87030 invoked by uid 500); 16 Apr 2009 15:41:20 -0000 Mailing-List: contact cvs-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list cvs@httpd.apache.org Received: (qmail 86953 invoked by uid 99); 16 Apr 2009 15:41:20 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 16 Apr 2009 15:41:20 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.4] (HELO eris.apache.org) (140.211.11.4) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 16 Apr 2009 15:41:18 +0000 Received: by eris.apache.org (Postfix, from userid 65534) id 57EEE238899B; Thu, 16 Apr 2009 15:40:57 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Subject: svn commit: r765672 - /httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml Date: Thu, 16 Apr 2009 15:40:57 -0000 To: cvs@httpd.apache.org From: lgentis@apache.org X-Mailer: svnmailer-1.0.8 Message-Id: <20090416154057.57EEE238899B@eris.apache.org> X-Virus-Checked: Checked by ClamAV on apache.org Author: lgentis Date: Thu Apr 16 15:40:56 2009 New Revision: 765672 URL: http://svn.apache.org/viewvc?rev=765672&view=rev Log: Two small typos. Modified: httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml Modified: httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml?rev=765672&r1=765671&r2=765672&view=diff ============================================================================== --- httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml (original) +++ httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml Thu Apr 16 15:40:56 2009 @@ -119,7 +119,7 @@

There is no known Python extension supporting Solaris privileges, so it is unlikely that a script could escalate privileges unless it can load external (non-Python) privileges-aware code. However, you should -nevertheless audit your mod_ruby installation.

+nevertheless audit your mod_python installation.

*** What are the issues of Python loading a shared object?

@@ -304,7 +304,7 @@ None virtual host Available on Solaris 10 and OpenSolaris with -non-threaded MPMs (prefork or custom MPM). +non-threaded MPMs (prefork or custom MPM) and when mod_privileges is compiled with the BIG_SECURITY_HOLE compile-time option.