diff options
author | Martin Pitt <martin.pitt@ubuntu.com> | 2016-10-28 15:35:29 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2016-10-28 15:35:29 +0200 |
commit | 1740c5a807708e74a7270bfb23beac2039135859 (patch) | |
tree | c5f1bcbeafad8613c4ba68de3d0f8fd1f2467e12 /man | |
parent | 4f985bd80278972912b80df1390f84d7a89f8d51 (diff) | |
parent | 74388c2d11acd9b638e33e09c7a99a9bc2c6292b (diff) |
Merge pull request #4458 from keszybz/man-nonewprivileges
Document NoNewPrivileges default value
Diffstat (limited to 'man')
-rw-r--r-- | man/systemd.exec.xml | 23 |
1 files changed, 16 insertions, 7 deletions
diff --git a/man/systemd.exec.xml b/man/systemd.exec.xml index dbe4594730..6a26f3c133 100644 --- a/man/systemd.exec.xml +++ b/man/systemd.exec.xml @@ -1234,13 +1234,22 @@ <varlistentry> <term><varname>NoNewPrivileges=</varname></term> - <listitem><para>Takes a boolean argument. If true, ensures - that the service process and all its children can never gain - new privileges. This option is more powerful than the - respective secure bits flags (see above), as it also prohibits - UID changes of any kind. This is the simplest, most effective - way to ensure that a process and its children can never - elevate privileges again.</para></listitem> + <listitem><para>Takes a boolean argument. If true, ensures that the service + process and all its children can never gain new privileges. This option is more + powerful than the respective secure bits flags (see above), as it also prohibits + UID changes of any kind. This is the simplest and most effective way to ensure that + a process and its children can never elevate privileges again. Defaults to false, + but in the user manager instance certain settings force + <varname>NoNewPrivileges=yes</varname>, ignoring the value of this setting. + Those is the case when <varname>SystemCallFilter=</varname>, + <varname>SystemCallArchitectures=</varname>, + <varname>RestrictAddressFamilies=</varname>, + <varname>PrivateDevices=</varname>, + <varname>ProtectKernelTunables=</varname>, + <varname>ProtectKernelModules=</varname>, + <varname>MemoryDenyWriteExecute=</varname>, or + <varname>RestrictRealtime=</varname> are specified. + </para></listitem> </varlistentry> <varlistentry> |