diff options
author | Kaz Kylheku <kaz@kylheku.com> | 2016-09-17 15:35:38 -0700 |
---|---|---|
committer | Kaz Kylheku <kaz@kylheku.com> | 2016-09-17 15:35:38 -0700 |
commit | 0bdd5c59675cce09791d51c8d533a9d14ca8da56 (patch) | |
tree | 1155668964dc681c5abeff279b87f4018b355ef3 /txr.1 | |
parent | c90ed00b05694300d39fd79c2d8ed9f6e57872e4 (diff) | |
download | txr-0bdd5c59675cce09791d51c8d533a9d14ca8da56.tar.gz txr-0bdd5c59675cce09791d51c8d533a9d14ca8da56.tar.bz2 txr-0bdd5c59675cce09791d51c8d533a9d14ca8da56.zip |
doc: typo in section on setuid operation.
* txr.1: "require user id" -> "required user id".
Diffstat (limited to 'txr.1')
-rw-r--r-- | txr.1 | 2 |
1 files changed, 1 insertions, 1 deletions
@@ -44685,7 +44685,7 @@ it has to be running with a root effective user ID somehow. In order to execute a file which is setuid to a non-root user, \*(TX has to be running effectively as root or else as that user. It doesn't matter whether these privileges are achieved effectively using the setuid mechanism, or -whether \*(TX is running with the require user ID as its real ID. +whether \*(TX is running with the required user ID as its real ID. However, if \*(TX is running setuid, it takes special care to temporarily drop the privileges as early as possible, and eventually to drop the privileges permanently before executing any code, other that the setuid |