diff options
Diffstat (limited to 'progs')
-rw-r--r-- | progs/capshdoc.h | 4 | ||||
-rwxr-xr-x | progs/quicktest.sh | 6 |
2 files changed, 5 insertions, 5 deletions
diff --git a/progs/capshdoc.h b/progs/capshdoc.h index 82f18fc..c182144 100644 --- a/progs/capshdoc.h +++ b/progs/capshdoc.h @@ -56,7 +56,7 @@ static const char *explanation6[] = { /* cap_setgid = 6 */ }; static const char *explanation7[] = { /* cap_setuid = 7 */ "Allows a process to freely manipulate its own UIDs:", - " - arbitraily set the UID, EUID, REUID and RESUID", + " - arbitrarily set the UID, EUID, REUID and RESUID", " values", " - allows the forging of UID credentials passed over a", " socket", @@ -79,7 +79,7 @@ static const char *explanation8[] = { /* cap_setpcap = 8 */ "default, as its unsuppressed behavior was not", "auditable: it could asynchronously grant its own", "Permitted capabilities to and remove capabilities from", - "other processes arbitraily. The former leads to", + "other processes arbitrarily. The former leads to", "undefined behavior, and the latter is better served by", "the kill system call.]", NULL diff --git a/progs/quicktest.sh b/progs/quicktest.sh index e508d0b..ba64ab5 100755 --- a/progs/quicktest.sh +++ b/progs/quicktest.sh @@ -1,7 +1,7 @@ #!/bin/bash # # Run through a series of tests to try out the various capability -# manipulations posible through exec. +# manipulations possible through exec. # # [Run this as root in a root-enabled process tree.] @@ -90,7 +90,7 @@ pass_capsh --keep=0 --keep=1 --keep=0 --keep=1 --print /bin/chmod u+s tcapsh /bin/ls -l tcapsh -# leverage keep caps to maintain capabilities accross a change of euid +# leverage keep caps to maintain capabilities across a change of euid # from setuid root to capable luser (as per wireshark/dumpcap 0.99.7) # This test is subtle. It is testing that a change to self, dropping # euid=0 back to that of the luser keeps capabilities. @@ -205,7 +205,7 @@ EOF # Next force the privileged binary to have an empty capability set. # This is sort of the opposite of privileged - it should ensure that - # the file can never aquire privilege by the ambient method. + # the file can never acquire privilege by the ambient method. ./setcap = ./privileged fail_capsh --keep=1 --uid=$nouid --inh=cap_setuid --addamb=cap_setuid -- -c "./privileged --print --uid=1" |