Use correct names when referring to subsections in the sudoers manual.
This commit is contained in:
@@ -167,7 +167,7 @@ DDEESSCCRRIIPPTTIIOONN
|
||||
attempts to change to that user's home directory before
|
||||
running the shell. The command is run with an environment
|
||||
similar to the one a user would receive at log in. The
|
||||
_C_o_m_m_a_n_d _E_n_v_i_r_o_n_m_e_n_t section in the sudoers(4) manual
|
||||
_C_o_m_m_a_n_d _e_n_v_i_r_o_n_m_e_n_t section in the sudoers(4) manual
|
||||
documents how the --ii option affects the environment in which
|
||||
a command is run when the _s_u_d_o_e_r_s policy is in use.
|
||||
|
||||
@@ -435,7 +435,7 @@ SSEECCUURRIITTYY NNOOTTEESS
|
||||
those commands. Because of this, care must be taken when giving users
|
||||
access to commands via ssuuddoo to verify that the command does not
|
||||
inadvertently give the user an effective root shell. For more
|
||||
information, please see the _P_R_E_V_E_N_T_I_N_G _S_H_E_L_L _E_S_C_A_P_E_S section in
|
||||
information, please see the _P_r_e_v_e_n_t_i_n_g _s_h_e_l_l _e_s_c_a_p_e_s section in
|
||||
sudoers(4).
|
||||
|
||||
To prevent the disclosure of potentially sensitive information, ssuuddoo
|
||||
|
@@ -21,7 +21,7 @@
|
||||
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
|
||||
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
|
||||
.\"
|
||||
.TH "SUDO" "@mansectsu@" "February 15, 2014" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
|
||||
.TH "SUDO" "8" "February 15, 2014" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
|
||||
.nh
|
||||
.if n .ad l
|
||||
.SH "NAME"
|
||||
@@ -367,7 +367,7 @@ shell.
|
||||
The command is run with an environment similar to the one
|
||||
a user would receive at log in.
|
||||
The
|
||||
\fICommand Environment\fR
|
||||
\fICommand environment\fR
|
||||
section in the
|
||||
sudoers(@mansectform@)
|
||||
manual documents how the
|
||||
@@ -879,7 +879,7 @@ Because of this, care must be taken when giving users access to commands via
|
||||
to verify that the command does not inadvertently give the user an
|
||||
effective root shell.
|
||||
For more information, please see the
|
||||
\fIPREVENTING SHELL ESCAPES\fR
|
||||
\fIPreventing shell escapes\fR
|
||||
section in
|
||||
sudoers(@mansectform@).
|
||||
.PP
|
||||
|
@@ -334,7 +334,7 @@ shell.
|
||||
The command is run with an environment similar to the one
|
||||
a user would receive at log in.
|
||||
The
|
||||
.Em Command Environment
|
||||
.Em Command environment
|
||||
section in the
|
||||
.Xr sudoers @mansectform@
|
||||
manual documents how the
|
||||
@@ -814,7 +814,7 @@ Because of this, care must be taken when giving users access to commands via
|
||||
to verify that the command does not inadvertently give the user an
|
||||
effective root shell.
|
||||
For more information, please see the
|
||||
.Em PREVENTING SHELL ESCAPES
|
||||
.Em Preventing shell escapes
|
||||
section in
|
||||
.Xr sudoers @mansectform@ .
|
||||
.Pp
|
||||
|
Reference in New Issue
Block a user