diff options
-rw-r--r-- | sudo.cat | 12 | ||||
-rw-r--r-- | sudo.html | 2 | ||||
-rw-r--r-- | sudo.man | 8 | ||||
-rw-r--r-- | sudo.pod | 2 |
4 files changed, 12 insertions, 12 deletions
@@ -61,7 +61,7 @@ OOOOPPPPTTTTIIIIOOOONNNNSSSS -6/Feb/99 1.5.8 1 +17/Feb/99 1.5.8 1 @@ -127,7 +127,7 @@ SSSSEEEECCCCUUUURRRRIIIITTTTYYYY NNNNOOOOTTTTE -6/Feb/99 1.5.8 2 +17/Feb/99 1.5.8 2 @@ -193,7 +193,7 @@ EEEENNNNVVVVIIIIRRRROOOONNNNMMMMEEEENNNNTTTT V -6/Feb/99 1.5.8 3 +17/Feb/99 1.5.8 3 @@ -231,7 +231,7 @@ DDDDIIIISSSSCCCCLLLLAAAAIIIIMMMMEEEERRRR CCCCAAAAVVVVEEEEAAAATTTTSSSS There is no easy way to prevent a user from gaining a root - shell if that user has access to commands allow shell + shell if that user has access to commands allowing shell escapes. If users have sudo ALL there is nothing to prevent them @@ -259,7 +259,7 @@ SSSSEEEEEEEE AAAALLLLSSSSOOOO -6/Feb/99 1.5.8 4 +17/Feb/99 1.5.8 4 @@ -325,6 +325,6 @@ sudo(8) MAINTENANCE COMMANDS sudo(8) -6/Feb/99 1.5.8 5 +17/Feb/99 1.5.8 5 @@ -358,7 +358,7 @@ Mass Ave, Cambridge, MA 02139, USA. </A></H1> There is no easy way to prevent a user from gaining a root shell if that -user has access to commands allow shell escapes. +user has access to commands allowing shell escapes. <P> @@ -2,8 +2,8 @@ ''' $RCSfile$$Revision$$Date$ ''' ''' $Log$ -''' Revision 1.29 1999/02/07 00:47:32 millert -''' Make it clear that it is the user's password, not root's, that we want. +''' Revision 1.30 1999/02/17 16:40:55 millert +''' fix grammar; espie@openbsd.org ''' ''' .de Sh @@ -96,7 +96,7 @@ .nr % 0 .rr F .\} -.TH sudo 8 "1.5.8" "6/Feb/99" "MAINTENANCE COMMANDS" +.TH sudo 8 "1.5.8" "17/Feb/99" "MAINTENANCE COMMANDS" .UC .if n .hy 0 .if n .na @@ -363,7 +363,7 @@ with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. .SH "CAVEATS" There is no easy way to prevent a user from gaining a root shell if -that user has access to commands allow shell escapes. +that user has access to commands allowing shell escapes. .PP If users have sudo ALL there is nothing to prevent them from creating their own program that gives them a root shell regardless of any \*(L'!\*(R' @@ -217,7 +217,7 @@ with this program; if not, write to the Free Software Foundation, Inc., =head1 CAVEATS There is no easy way to prevent a user from gaining a root shell if -that user has access to commands allow shell escapes. +that user has access to commands allowing shell escapes. If users have sudo ALL there is nothing to prevent them from creating their own program that gives them a root shell regardless of any '!' |