From f1081bdc42821d09bc75530efcba196175fa8da0 Mon Sep 17 00:00:00 2001 From: Michael Kerrisk Date: Sun, 8 Jul 2018 10:21:43 +0200 Subject: [PATCH] unix.7: Fix a minor imprecision in description of SCM_CREDENTIALS To spoof credentials requires privilege (i.e., capabilities), not UID 0. Signed-off-by: Michael Kerrisk --- man7/unix.7 | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/man7/unix.7 b/man7/unix.7 index 0e40885c2..d16cc30a8 100644 --- a/man7/unix.7 +++ b/man7/unix.7 @@ -400,8 +400,7 @@ header files) in order to obtain the definition of this structure. .IP The credentials which the sender specifies are checked by the kernel. -A process with effective user ID 0 is allowed to specify values that do -not match its own. +A privileged process is allowed to specify values that do not match its own. The sender must specify its own process ID (unless it has the capability .BR CAP_SYS_ADMIN ), its real user ID, effective user ID, or saved set-user-ID (unless it has