2011-07-20 06:53:17 +00:00
|
|
|
Removes setuid check because we are now using capabilities to ensure proper
|
|
|
|
suexec rights.
|
2011-04-06 12:50:49 +00:00
|
|
|
|
2011-07-20 06:53:17 +00:00
|
|
|
Upstream-status: Not acceptable for upstream in current status.
|
|
|
|
suexec_enabled part is in trunk,differently
|
2011-04-06 12:50:49 +00:00
|
|
|
|
2011-07-20 06:53:17 +00:00
|
|
|
diff --git a/os/unix/unixd.c b/os/unix/unixd.c
|
|
|
|
index 85d5a98..1ee1dfe 100644
|
|
|
|
--- a/os/unix/unixd.c
|
|
|
|
+++ b/os/unix/unixd.c
|
|
|
|
@@ -271,8 +271,8 @@ AP_DECLARE(void) unixd_pre_config(apr_pool_t *ptemp)
|
|
|
|
return;
|
2008-07-14 14:09:16 +00:00
|
|
|
}
|
|
|
|
|
2011-07-20 06:53:17 +00:00
|
|
|
- if ((wrapper.protection & APR_USETID) && wrapper.user == 0) {
|
2008-07-14 14:09:16 +00:00
|
|
|
- unixd_config.suexec_enabled = 1;
|
2011-07-20 06:53:17 +00:00
|
|
|
+ if (wrapper.user == 0) {
|
2008-07-14 14:09:16 +00:00
|
|
|
+ unixd_config.suexec_enabled = access(SUEXEC_BIN, R_OK|X_OK) == 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|