diff --git a/website/content/v1.4/learn-more/process-capabilities.md b/website/content/v1.4/learn-more/process-capabilities.md index b23d0f5dc..e08b77b75 100644 --- a/website/content/v1.4/learn-more/process-capabilities.md +++ b/website/content/v1.4/learn-more/process-capabilities.md @@ -9,7 +9,7 @@ Linux defines a set of [process capabilities](https://man7.org/linux/man-pages/m Talos Linux for security reasons restricts any process from gaining the following capabilities: * `CAP_SYS_MODULE` (loading kernel modules) -* `CAP_BOOT` (rebooting the system) +* `CAP_SYS_BOOT` (rebooting the system) This means that any process including privileged Kubernetes pods will not be able to get these capabilities. diff --git a/website/content/v1.5/learn-more/process-capabilities.md b/website/content/v1.5/learn-more/process-capabilities.md index b23d0f5dc..e08b77b75 100644 --- a/website/content/v1.5/learn-more/process-capabilities.md +++ b/website/content/v1.5/learn-more/process-capabilities.md @@ -9,7 +9,7 @@ Linux defines a set of [process capabilities](https://man7.org/linux/man-pages/m Talos Linux for security reasons restricts any process from gaining the following capabilities: * `CAP_SYS_MODULE` (loading kernel modules) -* `CAP_BOOT` (rebooting the system) +* `CAP_SYS_BOOT` (rebooting the system) This means that any process including privileged Kubernetes pods will not be able to get these capabilities.