diff options
| author | klensy <klensy@users.noreply.github.com> | 2024-12-07 13:51:08 +0300 |
|---|---|---|
| committer | klensy <klensy@users.noreply.github.com> | 2025-07-03 10:51:06 +0300 |
| commit | c76d032f0144b650a438ee1efba89c475e0b115b (patch) | |
| tree | 88aad6141d0dd4a3dd1ce5de8c38b001c5bd3ba4 /library/std/src/fs.rs | |
| parent | f51c9870bab634afb9e7a262b6ca7816bb9e940d (diff) | |
| download | rust-c76d032f0144b650a438ee1efba89c475e0b115b.tar.gz rust-c76d032f0144b650a438ee1efba89c475e0b115b.zip | |
setup CI and tidy to use typos for spellchecking and fix few typos
Diffstat (limited to 'library/std/src/fs.rs')
| -rw-r--r-- | library/std/src/fs.rs | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/library/std/src/fs.rs b/library/std/src/fs.rs index d9902d41928..7ae8e700ff6 100644 --- a/library/std/src/fs.rs +++ b/library/std/src/fs.rs @@ -3091,7 +3091,7 @@ pub fn read_dir<P: AsRef<Path>>(path: P) -> io::Result<ReadDir> { /// On UNIX-like systems, this function will update the permission bits /// of the file pointed to by the symlink. /// -/// Note that this behavior can lead to privalage escalation vulnerabilites, +/// Note that this behavior can lead to privalage escalation vulnerabilities, /// where the ability to create a symlink in one directory allows you to /// cause the permissions of another file or directory to be modified. /// |
