Date: Thu, 31 Mar 2022 02:07:07 GMT From: Greg Lehey <grog@FreeBSD.org> To: src-committers@FreeBSD.org, dev-commits-src-all@FreeBSD.org, dev-commits-src-main@FreeBSD.org Subject: git: 4044083079ea - main - chroot.2: Correct grammar errors. No functional change. Message-ID: <202203310207.22V277TX063086@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by grog: URL: https://cgit.FreeBSD.org/src/commit/?id=4044083079ea55097284adeed98a58067c737b98 commit 4044083079ea55097284adeed98a58067c737b98 Author: Greg Lehey <grog@FreeBSD.org> AuthorDate: 2022-03-31 02:05:49 +0000 Commit: Greg Lehey <grog@FreeBSD.org> CommitDate: 2022-03-31 02:05:49 +0000 chroot.2: Correct grammar errors. No functional change. MFC after: 1 week --- lib/libc/sys/chroot.2 | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lib/libc/sys/chroot.2 b/lib/libc/sys/chroot.2 index 69ee3743d9d3..f5d9fa5a8515 100644 --- a/lib/libc/sys/chroot.2 +++ b/lib/libc/sys/chroot.2 @@ -147,7 +147,7 @@ open directories, or a MAC check), it is possible that this system call may return an error, with the working directory of the process left changed. .Sh SECURITY CONSIDERATIONS -The system have many hardcoded paths to files where it may load after +The system has many hardcoded paths to files which it may load after the process starts. It is generally recommended to drop privileges immediately after a successful @@ -155,8 +155,8 @@ successful call, and restrict write access to a limited subtree of the .Nm -root, -for instance, +root. +For instance, setup the sandbox so that the sandboxed user will have no write access to any well-known system directories. .Pp
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202203310207.22V277TX063086>