summaryrefslogtreecommitdiff
path: root/security/advanced/frm_capabilities.tex
diff options
context:
space:
mode:
authorHolger Dengler <dengler@linutronix.de>2016-10-28 16:57:24 +0200
committerHolger Dengler <dengler@linutronix.de>2016-10-28 16:57:47 +0200
commitcd03b6d85930eaf8f68240cd3e91a6bcf5035c53 (patch)
tree809649e3234fb7d57ef394f8853ea4c80499a8f1 /security/advanced/frm_capabilities.tex
parent84508a664655fa1fac11711cb6ecfcba0e571a8f (diff)
security: Review findings (Holger, John)
Signed-off-by: Holger Dengler <dengler@linutronix.de>
Diffstat (limited to 'security/advanced/frm_capabilities.tex')
-rw-r--r--security/advanced/frm_capabilities.tex2
1 files changed, 1 insertions, 1 deletions
diff --git a/security/advanced/frm_capabilities.tex b/security/advanced/frm_capabilities.tex
index 5acd8e9..d4a2890 100644
--- a/security/advanced/frm_capabilities.tex
+++ b/security/advanced/frm_capabilities.tex
@@ -205,7 +205,7 @@ Scenario for dropping capabilities in suid-root processes
\item effective: drop all
\item permitted: keep only required
\end{itemize}
-\item set SEC\_KEEP\_CAPS (prctl(PR\_SET\_KEEPCAPS, 1))
+\item preserve capabilities (prctl(PR\_SET\_KEEPCAPS, 1))
\item set all UIDs to non-zero
\item raise capability in effecive set before calling a privileged syscall
\item drop capability from effective set after syscall