mirror of
https://github.com/sudo-project/sudo.git
synced 2025-08-30 22:05:46 +00:00
fix grammar; espie@openbsd.org
This commit is contained in:
12
sudo.cat
12
sudo.cat
@@ -61,7 +61,7 @@ OOOOPPPPTTTTIIIIOOOONNNNSSSS
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
6/Feb/99 1.5.8 1
|
17/Feb/99 1.5.8 1
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -127,7 +127,7 @@ SSSSEEEECCCCUUUURRRRIIIITTTTYYYY NNNNOOOOTTTTE
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
6/Feb/99 1.5.8 2
|
17/Feb/99 1.5.8 2
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -193,7 +193,7 @@ EEEENNNNVVVVIIIIRRRROOOONNNNMMMMEEEENNNNTTTT V
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
6/Feb/99 1.5.8 3
|
17/Feb/99 1.5.8 3
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -231,7 +231,7 @@ DDDDIIIISSSSCCCCLLLLAAAAIIIIMMMMEEEERRRR
|
|||||||
|
|
||||||
CCCCAAAAVVVVEEEEAAAATTTTSSSS
|
CCCCAAAAVVVVEEEEAAAATTTTSSSS
|
||||||
There is no easy way to prevent a user from gaining a root
|
There is no easy way to prevent a user from gaining a root
|
||||||
shell if that user has access to commands allow shell
|
shell if that user has access to commands allowing shell
|
||||||
escapes.
|
escapes.
|
||||||
|
|
||||||
If users have sudo ALL there is nothing to prevent them
|
If users have sudo ALL there is nothing to prevent them
|
||||||
@@ -259,7 +259,7 @@ SSSSEEEEEEEE AAAALLLLSSSSOOOO
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
6/Feb/99 1.5.8 4
|
17/Feb/99 1.5.8 4
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -325,6 +325,6 @@ sudo(8) MAINTENANCE COMMANDS sudo(8)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
6/Feb/99 1.5.8 5
|
17/Feb/99 1.5.8 5
|
||||||
|
|
||||||
|
|
||||||
|
@@ -358,7 +358,7 @@ Mass Ave, Cambridge, MA 02139, USA.
|
|||||||
|
|
||||||
</A></H1>
|
</A></H1>
|
||||||
There is no easy way to prevent a user from gaining a root shell if that
|
There is no easy way to prevent a user from gaining a root shell if that
|
||||||
user has access to commands allow shell escapes.
|
user has access to commands allowing shell escapes.
|
||||||
|
|
||||||
|
|
||||||
<P>
|
<P>
|
||||||
|
8
sudo.man
8
sudo.man
@@ -2,8 +2,8 @@
|
|||||||
''' $RCSfile$$Revision$$Date$
|
''' $RCSfile$$Revision$$Date$
|
||||||
'''
|
'''
|
||||||
''' $Log$
|
''' $Log$
|
||||||
''' Revision 1.29 1999/02/07 00:47:32 millert
|
''' Revision 1.30 1999/02/17 16:40:55 millert
|
||||||
''' Make it clear that it is the user's password, not root's, that we want.
|
''' fix grammar; espie@openbsd.org
|
||||||
'''
|
'''
|
||||||
'''
|
'''
|
||||||
.de Sh
|
.de Sh
|
||||||
@@ -96,7 +96,7 @@
|
|||||||
.nr % 0
|
.nr % 0
|
||||||
.rr F
|
.rr F
|
||||||
.\}
|
.\}
|
||||||
.TH sudo 8 "1.5.8" "6/Feb/99" "MAINTENANCE COMMANDS"
|
.TH sudo 8 "1.5.8" "17/Feb/99" "MAINTENANCE COMMANDS"
|
||||||
.UC
|
.UC
|
||||||
.if n .hy 0
|
.if n .hy 0
|
||||||
.if n .na
|
.if n .na
|
||||||
@@ -363,7 +363,7 @@ with this program; if not, write to the Free Software Foundation, Inc.,
|
|||||||
675 Mass Ave, Cambridge, MA 02139, USA.
|
675 Mass Ave, Cambridge, MA 02139, USA.
|
||||||
.SH "CAVEATS"
|
.SH "CAVEATS"
|
||||||
There is no easy way to prevent a user from gaining a root shell if
|
There is no easy way to prevent a user from gaining a root shell if
|
||||||
that user has access to commands allow shell escapes.
|
that user has access to commands allowing shell escapes.
|
||||||
.PP
|
.PP
|
||||||
If users have sudo ALL there is nothing to prevent them from creating
|
If users have sudo ALL there is nothing to prevent them from creating
|
||||||
their own program that gives them a root shell regardless of any \*(L'!\*(R'
|
their own program that gives them a root shell regardless of any \*(L'!\*(R'
|
||||||
|
2
sudo.pod
2
sudo.pod
@@ -217,7 +217,7 @@ with this program; if not, write to the Free Software Foundation, Inc.,
|
|||||||
=head1 CAVEATS
|
=head1 CAVEATS
|
||||||
|
|
||||||
There is no easy way to prevent a user from gaining a root shell if
|
There is no easy way to prevent a user from gaining a root shell if
|
||||||
that user has access to commands allow shell escapes.
|
that user has access to commands allowing shell escapes.
|
||||||
|
|
||||||
If users have sudo ALL there is nothing to prevent them from creating
|
If users have sudo ALL there is nothing to prevent them from creating
|
||||||
their own program that gives them a root shell regardless of any '!'
|
their own program that gives them a root shell regardless of any '!'
|
||||||
|
Reference in New Issue
Block a user