From 612ae1f307c2c81c857e0c2fb1c4e6260d000e5f Mon Sep 17 00:00:00 2001 From: Jared Kangas Date: Sep 06 2024 21:03:49 +0000 Subject: tasks: fix typos Signed-off-by: Jared Kangas --- diff --git a/modules/ROOT/pages/tasks/Tasks-Processes.adoc b/modules/ROOT/pages/tasks/Tasks-Processes.adoc index 14e924c..f714e07 100644 --- a/modules/ROOT/pages/tasks/Tasks-Processes.adoc +++ b/modules/ROOT/pages/tasks/Tasks-Processes.adoc @@ -276,7 +276,7 @@ performs these checks. * Use `secure_getenv` instead of `getenv` to obtain the value of critical environment variables. `secure_getenv` -will pretend the variable has not bee set if the process +will pretend the variable has not been set if the process environment is not trusted. Critical environment variables are debugging flags, diff --git a/modules/ROOT/pages/tasks/Tasks-Temporary_Files.adoc b/modules/ROOT/pages/tasks/Tasks-Temporary_Files.adoc index d0278b0..61558ff 100644 --- a/modules/ROOT/pages/tasks/Tasks-Temporary_Files.adoc +++ b/modules/ROOT/pages/tasks/Tasks-Temporary_Files.adoc @@ -140,7 +140,7 @@ When creating files in the temporary directory, use automatically generated names, e.g., derived from a sequential counter. Files with externally provided names could be picked up in unexpected contexts, and crafted names could actually -point outside of the tempoary directory (due to +point outside of the temporary directory (due to *directory traversal*). Removing a directory tree in a completely safe manner is