You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by lg...@apache.org on 2009/04/16 17:40:57 UTC

svn commit: r765672 - /httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml

Author: lgentis
Date: Thu Apr 16 15:40:56 2009
New Revision: 765672

URL: http://svn.apache.org/viewvc?rev=765672&view=rev
Log:
Two small typos.

Modified:
    httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml

Modified: httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml?rev=765672&r1=765671&r2=765672&view=diff
==============================================================================
--- httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml (original)
+++ httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml Thu Apr 16 15:40:56 2009
@@ -119,7 +119,7 @@
 <p>There is no known Python extension supporting Solaris privileges, so it
 is unlikely that a script could escalate privileges unless it can
 load external (non-Python) privileges-aware code.  However, you should
-nevertheless audit your mod_ruby installation.</p>
+nevertheless audit your mod_python installation.</p>
 
 <p>*** What are the issues of Python loading a shared object?</p>
 </section>
@@ -304,7 +304,7 @@
 <default>None</default>
 <contextlist><context>virtual host</context></contextlist>
 <compatibility>Available on Solaris 10 and OpenSolaris with
-non-threaded MPMs (<module>prefork</module> or custom MPM).
+non-threaded MPMs (<module>prefork</module> or custom MPM)
 and when <module>mod_privileges</module> is compiled with the
 <var>BIG_SECURITY_HOLE</var> compile-time option.</compatibility>