2
0
mirror of https://github.com/sudo-project/sudo.git synced 2025-08-30 22:05:46 +00:00
This commit is contained in:
Todd C. Miller
1999-02-17 16:40:55 +00:00
parent f9b80fcad4
commit aeffa02a17
4 changed files with 12 additions and 12 deletions

View File

@@ -61,7 +61,7 @@ OOOOPPPPTTTTIIIIOOOONNNNSSSS
6/Feb/99 1.5.8 1 17/Feb/99 1.5.8 1
@@ -127,7 +127,7 @@ SSSSEEEECCCCUUUURRRRIIIITTTTYYYY NNNNOOOOTTTTE
6/Feb/99 1.5.8 2 17/Feb/99 1.5.8 2
@@ -193,7 +193,7 @@ EEEENNNNVVVVIIIIRRRROOOONNNNMMMMEEEENNNNTTTT V
6/Feb/99 1.5.8 3 17/Feb/99 1.5.8 3
@@ -231,7 +231,7 @@ DDDDIIIISSSSCCCCLLLLAAAAIIIIMMMMEEEERRRR
CCCCAAAAVVVVEEEEAAAATTTTSSSS CCCCAAAAVVVVEEEEAAAATTTTSSSS
There is no easy way to prevent a user from gaining a root There is no easy way to prevent a user from gaining a root
shell if that user has access to commands allow shell shell if that user has access to commands allowing shell
escapes. escapes.
If users have sudo ALL there is nothing to prevent them If users have sudo ALL there is nothing to prevent them
@@ -259,7 +259,7 @@ SSSSEEEEEEEE AAAALLLLSSSSOOOO
6/Feb/99 1.5.8 4 17/Feb/99 1.5.8 4
@@ -325,6 +325,6 @@ sudo(8) MAINTENANCE COMMANDS sudo(8)
6/Feb/99 1.5.8 5 17/Feb/99 1.5.8 5

View File

@@ -358,7 +358,7 @@ Mass Ave, Cambridge, MA 02139, USA.
</A></H1> </A></H1>
There is no easy way to prevent a user from gaining a root shell if that There is no easy way to prevent a user from gaining a root shell if that
user has access to commands allow shell escapes. user has access to commands allowing shell escapes.
<P> <P>

View File

@@ -2,8 +2,8 @@
''' $RCSfile$$Revision$$Date$ ''' $RCSfile$$Revision$$Date$
''' '''
''' $Log$ ''' $Log$
''' Revision 1.29 1999/02/07 00:47:32 millert ''' Revision 1.30 1999/02/17 16:40:55 millert
''' Make it clear that it is the user's password, not root's, that we want. ''' fix grammar; espie@openbsd.org
''' '''
''' '''
.de Sh .de Sh
@@ -96,7 +96,7 @@
.nr % 0 .nr % 0
.rr F .rr F
.\} .\}
.TH sudo 8 "1.5.8" "6/Feb/99" "MAINTENANCE COMMANDS" .TH sudo 8 "1.5.8" "17/Feb/99" "MAINTENANCE COMMANDS"
.UC .UC
.if n .hy 0 .if n .hy 0
.if n .na .if n .na
@@ -363,7 +363,7 @@ with this program; if not, write to the Free Software Foundation, Inc.,
675 Mass Ave, Cambridge, MA 02139, USA. 675 Mass Ave, Cambridge, MA 02139, USA.
.SH "CAVEATS" .SH "CAVEATS"
There is no easy way to prevent a user from gaining a root shell if There is no easy way to prevent a user from gaining a root shell if
that user has access to commands allow shell escapes. that user has access to commands allowing shell escapes.
.PP .PP
If users have sudo ALL there is nothing to prevent them from creating If users have sudo ALL there is nothing to prevent them from creating
their own program that gives them a root shell regardless of any \*(L'!\*(R' their own program that gives them a root shell regardless of any \*(L'!\*(R'

View File

@@ -217,7 +217,7 @@ with this program; if not, write to the Free Software Foundation, Inc.,
=head1 CAVEATS =head1 CAVEATS
There is no easy way to prevent a user from gaining a root shell if There is no easy way to prevent a user from gaining a root shell if
that user has access to commands allow shell escapes. that user has access to commands allowing shell escapes.
If users have sudo ALL there is nothing to prevent them from creating If users have sudo ALL there is nothing to prevent them from creating
their own program that gives them a root shell regardless of any '!' their own program that gives them a root shell regardless of any '!'