$ uname -r
2.6.24-2-generic
0 [EMAIL PROTECTED]:~$ sudo getpcaps 1
Capabilities for `1': =ep cap_setpcap-e
This is exactly how it should be. Allowing CAP_SETPCAP is crackful
security-wise, since it allows root processes to randomly increase the
privileges of other processes (violating a golden rule of security).
Thus you potentially lose the enforcing of privilege restrictions.
** Changed in: linux (Ubuntu)
Status: Fix Committed => Won't Fix
--
ubuntu kernel removes CAP_SETPCAP
https://bugs.launchpad.net/bugs/95089
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs