mirror of
https://github.com/sudo-project/sudo.git
synced 2025-08-30 05:48:18 +00:00
fix grammar; espie@openbsd.org
This commit is contained in:
parent
f9b80fcad4
commit
aeffa02a17
12
sudo.cat
12
sudo.cat
@ -61,7 +61,7 @@ OOOOPPPPTTTTIIIIOOOONNNNSSSS
|
||||
|
||||
|
||||
|
||||
6/Feb/99 1.5.8 1
|
||||
17/Feb/99 1.5.8 1
|
||||
|
||||
|
||||
|
||||
@ -127,7 +127,7 @@ SSSSEEEECCCCUUUURRRRIIIITTTTYYYY NNNNOOOOTTTTE
|
||||
|
||||
|
||||
|
||||
6/Feb/99 1.5.8 2
|
||||
17/Feb/99 1.5.8 2
|
||||
|
||||
|
||||
|
||||
@ -193,7 +193,7 @@ EEEENNNNVVVVIIIIRRRROOOONNNNMMMMEEEENNNNTTTT V
|
||||
|
||||
|
||||
|
||||
6/Feb/99 1.5.8 3
|
||||
17/Feb/99 1.5.8 3
|
||||
|
||||
|
||||
|
||||
@ -231,7 +231,7 @@ DDDDIIIISSSSCCCCLLLLAAAAIIIIMMMMEEEERRRR
|
||||
|
||||
CCCCAAAAVVVVEEEEAAAATTTTSSSS
|
||||
There is no easy way to prevent a user from gaining a root
|
||||
shell if that user has access to commands allow shell
|
||||
shell if that user has access to commands allowing shell
|
||||
escapes.
|
||||
|
||||
If users have sudo ALL there is nothing to prevent them
|
||||
@ -259,7 +259,7 @@ SSSSEEEEEEEE AAAALLLLSSSSOOOO
|
||||
|
||||
|
||||
|
||||
6/Feb/99 1.5.8 4
|
||||
17/Feb/99 1.5.8 4
|
||||
|
||||
|
||||
|
||||
@ -325,6 +325,6 @@ sudo(8) MAINTENANCE COMMANDS sudo(8)
|
||||
|
||||
|
||||
|
||||
6/Feb/99 1.5.8 5
|
||||
17/Feb/99 1.5.8 5
|
||||
|
||||
|
||||
|
@ -358,7 +358,7 @@ Mass Ave, Cambridge, MA 02139, USA.
|
||||
|
||||
</A></H1>
|
||||
There is no easy way to prevent a user from gaining a root shell if that
|
||||
user has access to commands allow shell escapes.
|
||||
user has access to commands allowing shell escapes.
|
||||
|
||||
|
||||
<P>
|
||||
|
8
sudo.man
8
sudo.man
@ -2,8 +2,8 @@
|
||||
''' $RCSfile$$Revision$$Date$
|
||||
'''
|
||||
''' $Log$
|
||||
''' Revision 1.29 1999/02/07 00:47:32 millert
|
||||
''' Make it clear that it is the user's password, not root's, that we want.
|
||||
''' Revision 1.30 1999/02/17 16:40:55 millert
|
||||
''' fix grammar; espie@openbsd.org
|
||||
'''
|
||||
'''
|
||||
.de Sh
|
||||
@ -96,7 +96,7 @@
|
||||
.nr % 0
|
||||
.rr F
|
||||
.\}
|
||||
.TH sudo 8 "1.5.8" "6/Feb/99" "MAINTENANCE COMMANDS"
|
||||
.TH sudo 8 "1.5.8" "17/Feb/99" "MAINTENANCE COMMANDS"
|
||||
.UC
|
||||
.if n .hy 0
|
||||
.if n .na
|
||||
@ -363,7 +363,7 @@ with this program; if not, write to the Free Software Foundation, Inc.,
|
||||
675 Mass Ave, Cambridge, MA 02139, USA.
|
||||
.SH "CAVEATS"
|
||||
There is no easy way to prevent a user from gaining a root shell if
|
||||
that user has access to commands allow shell escapes.
|
||||
that user has access to commands allowing shell escapes.
|
||||
.PP
|
||||
If users have sudo ALL there is nothing to prevent them from creating
|
||||
their own program that gives them a root shell regardless of any \*(L'!\*(R'
|
||||
|
2
sudo.pod
2
sudo.pod
@ -217,7 +217,7 @@ with this program; if not, write to the Free Software Foundation, Inc.,
|
||||
=head1 CAVEATS
|
||||
|
||||
There is no easy way to prevent a user from gaining a root shell if
|
||||
that user has access to commands allow shell escapes.
|
||||
that user has access to commands allowing shell escapes.
|
||||
|
||||
If users have sudo ALL there is nothing to prevent them from creating
|
||||
their own program that gives them a root shell regardless of any '!'
|
||||
|
Loading…
x
Reference in New Issue
Block a user