X-Git-Url: https://gerrit.automotivelinux.org/gerrit/gitweb?a=blobdiff_plain;f=docs%2F2_Architecture_Guides%2F2_Security_Blueprint%2F5_Platform.md;h=2112fdcee8483685bf9c99532c7e70bcf40e148e;hb=refs%2Fchanges%2F51%2F27051%2F2;hp=917404be6ca1ec20ceb8b699fb96a7d3f3059cf9;hpb=8bba2503735252906c8ebfb60669ec821d64c8a0;p=AGL%2Fdocumentation.git diff --git a/docs/2_Architecture_Guides/2_Security_Blueprint/5_Platform.md b/docs/2_Architecture_Guides/2_Security_Blueprint/5_Platform.md index 917404b..2112fdc 100644 --- a/docs/2_Architecture_Guides/2_Security_Blueprint/5_Platform.md +++ b/docs/2_Architecture_Guides/2_Security_Blueprint/5_Platform.md @@ -653,7 +653,7 @@ vulnerable to attack. For example, if the kernel is stopped and restarted with the *security=none* flag, then SMACK is not enabled. Furthermore, `systemd` starts the loading of **SMACK** rules during start-up. If this start-up process is interfered with, then **SMACK** will not run. Alternatively, new policies can -be added with `smackload` allowing unforseen privileges to alternative +be added with `smackload` allowing unforeseen privileges to alternative applications/executables. Another intrusion on the kernel level is to rebuild the kernel (as it is @@ -918,4 +918,4 @@ a capability. These capabilities are divided into three groups: - e: Effective: This means the capability is “activated”. - p: Permitted: This means the capability can be used/is allowed. - i: Inherited: The capability is kept by child/subprocesses upon execve() for - example. \ No newline at end of file + example.