summaryrefslogtreecommitdiff
path: root/security/advanced
diff options
context:
space:
mode:
authorHolger Dengler <dengler@linutronix.de>2016-10-28 16:57:24 +0200
committerHolger Dengler <dengler@linutronix.de>2016-10-28 16:57:47 +0200
commitcd03b6d85930eaf8f68240cd3e91a6bcf5035c53 (patch)
tree809649e3234fb7d57ef394f8853ea4c80499a8f1 /security/advanced
parent84508a664655fa1fac11711cb6ecfcba0e571a8f (diff)
security: Review findings (Holger, John)
Signed-off-by: Holger Dengler <dengler@linutronix.de>
Diffstat (limited to 'security/advanced')
-rw-r--r--security/advanced/frm_capabilities.tex2
-rw-r--r--security/advanced/frm_namespace_container.tex2
2 files changed, 3 insertions, 1 deletions
diff --git a/security/advanced/frm_capabilities.tex b/security/advanced/frm_capabilities.tex
index 5acd8e9..d4a2890 100644
--- a/security/advanced/frm_capabilities.tex
+++ b/security/advanced/frm_capabilities.tex
@@ -205,7 +205,7 @@ Scenario for dropping capabilities in suid-root processes
\item effective: drop all
\item permitted: keep only required
\end{itemize}
-\item set SEC\_KEEP\_CAPS (prctl(PR\_SET\_KEEPCAPS, 1))
+\item preserve capabilities (prctl(PR\_SET\_KEEPCAPS, 1))
\item set all UIDs to non-zero
\item raise capability in effecive set before calling a privileged syscall
\item drop capability from effective set after syscall
diff --git a/security/advanced/frm_namespace_container.tex b/security/advanced/frm_namespace_container.tex
index c63b6b2..5b907e6 100644
--- a/security/advanced/frm_namespace_container.tex
+++ b/security/advanced/frm_namespace_container.tex
@@ -37,6 +37,8 @@
\begin{itemize}
\item Mount: \\
Provide different filesystem
+\item PID: \\
+ Provide new Process-ID scope
\item IPC: \\
Provide isolated inter process communication entities
\item Network: \\