Return-Path:
Delivered-To: apmail-httpd-cvs-archive@www.apache.org
Received: (qmail 50239 invoked from network); 16 Apr 2009 15:41:21 -0000
Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3)
by minotaur.apache.org with SMTP; 16 Apr 2009 15:41:21 -0000
Received: (qmail 87128 invoked by uid 500); 16 Apr 2009 15:41:20 -0000
Delivered-To: apmail-httpd-cvs-archive@httpd.apache.org
Received: (qmail 87030 invoked by uid 500); 16 Apr 2009 15:41:20 -0000
Mailing-List: contact cvs-help@httpd.apache.org; run by ezmlm
Precedence: bulk
Reply-To: dev@httpd.apache.org
list-help:
list-unsubscribe:
List-Post:
List-Id:
Delivered-To: mailing list cvs@httpd.apache.org
Received: (qmail 86953 invoked by uid 99); 16 Apr 2009 15:41:20 -0000
Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230)
by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 16 Apr 2009 15:41:20 +0000
X-ASF-Spam-Status: No, hits=-2000.0 required=10.0
tests=ALL_TRUSTED
X-Spam-Check-By: apache.org
Received: from [140.211.11.4] (HELO eris.apache.org) (140.211.11.4)
by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 16 Apr 2009 15:41:18 +0000
Received: by eris.apache.org (Postfix, from userid 65534)
id 57EEE238899B; Thu, 16 Apr 2009 15:40:57 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Subject: svn commit: r765672 -
/httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml
Date: Thu, 16 Apr 2009 15:40:57 -0000
To: cvs@httpd.apache.org
From: lgentis@apache.org
X-Mailer: svnmailer-1.0.8
Message-Id: <20090416154057.57EEE238899B@eris.apache.org>
X-Virus-Checked: Checked by ClamAV on apache.org
Author: lgentis
Date: Thu Apr 16 15:40:56 2009
New Revision: 765672
URL: http://svn.apache.org/viewvc?rev=765672&view=rev
Log:
Two small typos.
Modified:
httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml
Modified: httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml?rev=765672&r1=765671&r2=765672&view=diff
==============================================================================
--- httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml (original)
+++ httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml Thu Apr 16 15:40:56 2009
@@ -119,7 +119,7 @@
There is no known Python extension supporting Solaris privileges, so it
is unlikely that a script could escalate privileges unless it can
load external (non-Python) privileges-aware code. However, you should
-nevertheless audit your mod_ruby installation.
+nevertheless audit your mod_python installation.
*** What are the issues of Python loading a shared object?
@@ -304,7 +304,7 @@
None
virtual host
Available on Solaris 10 and OpenSolaris with
-non-threaded MPMs (prefork or custom MPM).
+non-threaded MPMs (prefork or custom MPM)
and when mod_privileges is compiled with the
BIG_SECURITY_HOLE compile-time option.