unix.7: Fix a minor imprecision in description of SCM_CREDENTIALS

To spoof credentials requires privilege (i.e., capabilities),
not UID 0.

Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2018-07-08 10:21:43 +02:00
parent b66d5714b1
commit f1081bdc42
1 changed files with 1 additions and 2 deletions

View File

@ -400,8 +400,7 @@ header files) in order to obtain the definition
of this structure.
.IP
The credentials which the sender specifies are checked by the kernel.
A process with effective user ID 0 is allowed to specify values that do
not match its own.
A privileged process is allowed to specify values that do not match its own.
The sender must specify its own process ID (unless it has the capability
.BR CAP_SYS_ADMIN ),
its real user ID, effective user ID, or saved set-user-ID (unless it has