You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by lg...@apache.org on 2009/04/16 17:40:57 UTC
svn commit: r765672 - /httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml
Author: lgentis
Date: Thu Apr 16 15:40:56 2009
New Revision: 765672
URL: http://svn.apache.org/viewvc?rev=765672&view=rev
Log:
Two small typos.
Modified:
httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml
Modified: httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml?rev=765672&r1=765671&r2=765672&view=diff
==============================================================================
--- httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml (original)
+++ httpd/httpd/trunk/docs/manual/mod/mod_privileges.xml Thu Apr 16 15:40:56 2009
@@ -119,7 +119,7 @@
<p>There is no known Python extension supporting Solaris privileges, so it
is unlikely that a script could escalate privileges unless it can
load external (non-Python) privileges-aware code. However, you should
-nevertheless audit your mod_ruby installation.</p>
+nevertheless audit your mod_python installation.</p>
<p>*** What are the issues of Python loading a shared object?</p>
</section>
@@ -304,7 +304,7 @@
<default>None</default>
<contextlist><context>virtual host</context></contextlist>
<compatibility>Available on Solaris 10 and OpenSolaris with
-non-threaded MPMs (<module>prefork</module> or custom MPM).
+non-threaded MPMs (<module>prefork</module> or custom MPM)
and when <module>mod_privileges</module> is compiled with the
<var>BIG_SECURITY_HOLE</var> compile-time option.</compatibility>