Use @mansectsu@ and @mansectform@ in the man page bodies as well.
This commit is contained in:
20
sudo.cat
20
sudo.cat
@@ -61,7 +61,7 @@ OOOOPPPPTTTTIIIIOOOONNNNSSSS
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 1
|
26/Mar/2000 1.6.3 1
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -122,12 +122,12 @@ sudo(1m) MAINTENANCE COMMANDS sudo(1m)
|
|||||||
|
|
||||||
-s The -s (_s_h_e_l_l) option runs the shell specified by the
|
-s The -s (_s_h_e_l_l) option runs the shell specified by the
|
||||||
_S_H_E_L_L environment variable if it is set or the shell
|
_S_H_E_L_L environment variable if it is set or the shell
|
||||||
as specified in _p_a_s_s_w_d(5).
|
as specified in _p_a_s_s_w_d(4).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 2
|
26/Mar/2000 1.6.3 2
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -138,7 +138,7 @@ sudo(1m) MAINTENANCE COMMANDS sudo(1m)
|
|||||||
|
|
||||||
-H The -H (_H_O_M_E) option sets the _H_O_M_E environment
|
-H The -H (_H_O_M_E) option sets the _H_O_M_E environment
|
||||||
variable to the homedir of the target user (root by
|
variable to the homedir of the target user (root by
|
||||||
default) as specified in _p_a_s_s_w_d(5). By default, ssssuuuuddddoooo
|
default) as specified in _p_a_s_s_w_d(4). By default, ssssuuuuddddoooo
|
||||||
does not modify _H_O_M_E.
|
does not modify _H_O_M_E.
|
||||||
|
|
||||||
-S The -S (_s_t_d_i_n) option causes ssssuuuuddddoooo to read the password
|
-S The -S (_s_t_d_i_n) option causes ssssuuuuddddoooo to read the password
|
||||||
@@ -193,7 +193,7 @@ SSSSEEEECCCCUUUURRRRIIIITTTTYYYY NNNNOOOOTTTTE
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 3
|
26/Mar/2000 1.6.3 3
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -225,7 +225,7 @@ sudo(1m) MAINTENANCE COMMANDS sudo(1m)
|
|||||||
give away files.
|
give away files.
|
||||||
|
|
||||||
EEEEXXXXAAAAMMMMPPPPLLLLEEEESSSS
|
EEEEXXXXAAAAMMMMPPPPLLLLEEEESSSS
|
||||||
Note: the following examples assume suitable _s_u_d_o_e_r_s(5)
|
Note: the following examples assume suitable _s_u_d_o_e_r_s(4)
|
||||||
entries.
|
entries.
|
||||||
|
|
||||||
To get a file listing of an unreadable directory:
|
To get a file listing of an unreadable directory:
|
||||||
@@ -259,7 +259,7 @@ EEEENNNNVVVVIIIIRRRROOOONNNNMMMMEEEENNNNTTTT
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 4
|
26/Mar/2000 1.6.3 4
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -325,7 +325,7 @@ CCCCAAAAVVVVEEEEAAAATTTTSSSS
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 5
|
26/Mar/2000 1.6.3 5
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -337,7 +337,7 @@ sudo(1m) MAINTENANCE COMMANDS sudo(1m)
|
|||||||
directory, setuid shell scripts are generally safe).
|
directory, setuid shell scripts are generally safe).
|
||||||
|
|
||||||
SSSSEEEEEEEE AAAALLLLSSSSOOOO
|
SSSSEEEEEEEE AAAALLLLSSSSOOOO
|
||||||
_l_o_g_i_n___c_a_p(3), _s_u_d_o_e_r_s(5), _v_i_s_u_d_o(8), _s_u(1).
|
_l_o_g_i_n___c_a_p(3), _s_u_d_o_e_r_s(4), _v_i_s_u_d_o(1m), _s_u(1).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -391,6 +391,6 @@ SSSSEEEEEEEE AAAALLLLSSSSOOOO
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 6
|
26/Mar/2000 1.6.3 6
|
||||||
|
|
||||||
|
|
||||||
|
18
sudo.man.in
18
sudo.man.in
@@ -2,12 +2,8 @@
|
|||||||
''' $RCSfile$$Revision$$Date$
|
''' $RCSfile$$Revision$$Date$
|
||||||
'''
|
'''
|
||||||
''' $Log$
|
''' $Log$
|
||||||
''' Revision 1.2 2000/03/23 00:35:58 millert
|
''' Revision 1.3 2000/03/27 03:26:23 millert
|
||||||
''' Add FreeBSD login.conf support (untested on BSD/OS) based on a patch from
|
''' Use @mansectsu@ and @mansectform@ in the man page bodies as well.
|
||||||
''' Michael D. Marchionna.
|
|
||||||
''' configure now does substitution on the man pages, allowing us to
|
|
||||||
''' fix up the paths and set the section correctly. Based on an idea
|
|
||||||
''' from Michael D. Marchionna.
|
|
||||||
'''
|
'''
|
||||||
'''
|
'''
|
||||||
.de Sh
|
.de Sh
|
||||||
@@ -100,7 +96,7 @@
|
|||||||
.nr % 0
|
.nr % 0
|
||||||
.rr F
|
.rr F
|
||||||
.\}
|
.\}
|
||||||
.TH sudo @mansectsu@ "1.6.3" "22/Mar/2000" "MAINTENANCE COMMANDS"
|
.TH sudo @mansectsu@ "1.6.3" "26/Mar/2000" "MAINTENANCE COMMANDS"
|
||||||
.UC
|
.UC
|
||||||
.if n .hy 0
|
.if n .hy 0
|
||||||
.if n .na
|
.if n .na
|
||||||
@@ -286,11 +282,11 @@ as a user other than \fIroot\fR. To specify a \fIuid\fR instead of a
|
|||||||
.Ip "-s" 4
|
.Ip "-s" 4
|
||||||
The \f(CW-s\fR (\fIshell\fR) option runs the shell specified by the \fI\s-1SHELL\s0\fR
|
The \f(CW-s\fR (\fIshell\fR) option runs the shell specified by the \fI\s-1SHELL\s0\fR
|
||||||
environment variable if it is set or the shell as specified
|
environment variable if it is set or the shell as specified
|
||||||
in \fIpasswd\fR\|(5).
|
in \fIpasswd\fR\|(@mansectform@).
|
||||||
.Ip "-H" 4
|
.Ip "-H" 4
|
||||||
The \f(CW-H\fR (\fI\s-1HOME\s0\fR) option sets the \fI\s-1HOME\s0\fR environment variable
|
The \f(CW-H\fR (\fI\s-1HOME\s0\fR) option sets the \fI\s-1HOME\s0\fR environment variable
|
||||||
to the homedir of the target user (root by default) as specified
|
to the homedir of the target user (root by default) as specified
|
||||||
in \fIpasswd\fR\|(5). By default, \fBsudo\fR does not modify \fI\s-1HOME\s0\fR.
|
in \fIpasswd\fR\|(@mansectform@). By default, \fBsudo\fR does not modify \fI\s-1HOME\s0\fR.
|
||||||
.Ip "-S" 4
|
.Ip "-S" 4
|
||||||
The \f(CW-S\fR (\fIstdin\fR) option causes \fBsudo\fR to read the password from
|
The \f(CW-S\fR (\fIstdin\fR) option causes \fBsudo\fR to read the password from
|
||||||
standard input instead of the terminal device.
|
standard input instead of the terminal device.
|
||||||
@@ -354,7 +350,7 @@ will be ignored and sudo will log and complain. This is done to
|
|||||||
keep a user from creating his/her own timestamp with a bogus
|
keep a user from creating his/her own timestamp with a bogus
|
||||||
date on system that allow users to give away files.
|
date on system that allow users to give away files.
|
||||||
.SH "EXAMPLES"
|
.SH "EXAMPLES"
|
||||||
Note: the following examples assume suitable \fIsudoers\fR\|(5) entries.
|
Note: the following examples assume suitable \fIsudoers\fR\|(@mansectform@) entries.
|
||||||
.PP
|
.PP
|
||||||
To get a file listing of an unreadable directory:
|
To get a file listing of an unreadable directory:
|
||||||
.PP
|
.PP
|
||||||
@@ -439,7 +435,7 @@ that make setuid shell scripts unsafe on some operating systems
|
|||||||
(if your OS supports the /dev/fd/ directory, setuid shell scripts
|
(if your OS supports the /dev/fd/ directory, setuid shell scripts
|
||||||
are generally safe).
|
are generally safe).
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
\fIlogin_cap\fR\|(3), \fIsudoers\fR\|(5), \fIvisudo\fR\|(8), \fIsu\fR\|(1).
|
\fIlogin_cap\fR\|(3), \fIsudoers\fR\|(@mansectform@), \fIvisudo\fR\|(@mansectsu@), \fIsu\fR\|(1).
|
||||||
|
|
||||||
.rn }` ''
|
.rn }` ''
|
||||||
.IX Title "sudo @mansectsu@"
|
.IX Title "sudo @mansectsu@"
|
||||||
|
8
sudo.pod
8
sudo.pod
@@ -160,13 +160,13 @@ I<username>, use "#uid".
|
|||||||
|
|
||||||
The C<-s> (I<shell>) option runs the shell specified by the I<SHELL>
|
The C<-s> (I<shell>) option runs the shell specified by the I<SHELL>
|
||||||
environment variable if it is set or the shell as specified
|
environment variable if it is set or the shell as specified
|
||||||
in passwd(5).
|
in passwd(@mansectform@).
|
||||||
|
|
||||||
=item -H
|
=item -H
|
||||||
|
|
||||||
The C<-H> (I<HOME>) option sets the I<HOME> environment variable
|
The C<-H> (I<HOME>) option sets the I<HOME> environment variable
|
||||||
to the homedir of the target user (root by default) as specified
|
to the homedir of the target user (root by default) as specified
|
||||||
in passwd(5). By default, B<sudo> does not modify I<HOME>.
|
in passwd(@mansectform@). By default, B<sudo> does not modify I<HOME>.
|
||||||
|
|
||||||
=item -S
|
=item -S
|
||||||
|
|
||||||
@@ -242,7 +242,7 @@ date on system that allow users to give away files.
|
|||||||
|
|
||||||
=head1 EXAMPLES
|
=head1 EXAMPLES
|
||||||
|
|
||||||
Note: the following examples assume suitable sudoers(5) entries.
|
Note: the following examples assume suitable sudoers(@mansectform@) entries.
|
||||||
|
|
||||||
To get a file listing of an unreadable directory:
|
To get a file listing of an unreadable directory:
|
||||||
|
|
||||||
@@ -329,4 +329,4 @@ are generally safe).
|
|||||||
|
|
||||||
=head1 SEE ALSO
|
=head1 SEE ALSO
|
||||||
|
|
||||||
login_cap(3), sudoers(5), visudo(8), su(1).
|
login_cap(3), sudoers(@mansectform@), visudo(@mansectsu@), su(1).
|
||||||
|
36
sudoers.cat
36
sudoers.cat
@@ -61,7 +61,7 @@ DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 1
|
26/Mar/2000 1.6.3 1
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -127,7 +127,7 @@ sudoers(4) FILE FORMATS sudoers(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 2
|
26/Mar/2000 1.6.3 2
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -193,7 +193,7 @@ sudoers(4) FILE FORMATS sudoers(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 3
|
26/Mar/2000 1.6.3 3
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -259,7 +259,7 @@ sudoers(4) FILE FORMATS sudoers(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 4
|
26/Mar/2000 1.6.3 4
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -325,7 +325,7 @@ sudoers(4) FILE FORMATS sudoers(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 5
|
26/Mar/2000 1.6.3 5
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -391,7 +391,7 @@ sudoers(4) FILE FORMATS sudoers(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 6
|
26/Mar/2000 1.6.3 6
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -457,7 +457,7 @@ sudoers(4) FILE FORMATS sudoers(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 7
|
26/Mar/2000 1.6.3 7
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -523,7 +523,7 @@ sudoers(4) FILE FORMATS sudoers(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 8
|
26/Mar/2000 1.6.3 8
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -589,7 +589,7 @@ sudoers(4) FILE FORMATS sudoers(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 9
|
26/Mar/2000 1.6.3 9
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -655,7 +655,7 @@ sudoers(4) FILE FORMATS sudoers(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 10
|
26/Mar/2000 1.6.3 10
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -721,7 +721,7 @@ sudoers(4) FILE FORMATS sudoers(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 11
|
26/Mar/2000 1.6.3 11
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -787,7 +787,7 @@ sudoers(4) FILE FORMATS sudoers(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 12
|
26/Mar/2000 1.6.3 12
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -853,7 +853,7 @@ EEEEXXXXAAAAMMMMPPPPLLLLEEEESSSS
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 13
|
26/Mar/2000 1.6.3 13
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -919,7 +919,7 @@ sudoers(4) FILE FORMATS sudoers(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 14
|
26/Mar/2000 1.6.3 14
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -985,7 +985,7 @@ sudoers(4) FILE FORMATS sudoers(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 15
|
26/Mar/2000 1.6.3 15
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -1040,7 +1040,7 @@ FFFFIIIILLLLEEEESSSS
|
|||||||
|
|
||||||
|
|
||||||
SSSSEEEEEEEE AAAALLLLSSSSOOOO
|
SSSSEEEEEEEE AAAALLLLSSSSOOOO
|
||||||
_s_u_d_o(8), _v_i_s_u_d_o(8), _s_u(1), _f_n_m_a_t_c_h(3).
|
_s_u_d_o(1m), _v_i_s_u_d_o(1m), _s_u(1), _f_n_m_a_t_c_h(3).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -1051,7 +1051,7 @@ SSSSEEEEEEEE AAAALLLLSSSSOOOO
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 16
|
26/Mar/2000 1.6.3 16
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -1117,6 +1117,6 @@ sudoers(4) FILE FORMATS sudoers(4)
|
|||||||
|
|
||||||
|
|
||||||
|
|
||||||
22/Mar/2000 1.6.3 17
|
26/Mar/2000 1.6.3 17
|
||||||
|
|
||||||
|
|
||||||
|
@@ -2,8 +2,8 @@
|
|||||||
''' $RCSfile$$Revision$$Date$
|
''' $RCSfile$$Revision$$Date$
|
||||||
'''
|
'''
|
||||||
''' $Log$
|
''' $Log$
|
||||||
''' Revision 1.4 2000/03/23 04:09:53 millert
|
''' Revision 1.5 2000/03/27 03:26:23 millert
|
||||||
''' Add support for wildcards in the hostname.
|
''' Use @mansectsu@ and @mansectform@ in the man page bodies as well.
|
||||||
'''
|
'''
|
||||||
'''
|
'''
|
||||||
.de Sh
|
.de Sh
|
||||||
@@ -96,7 +96,7 @@
|
|||||||
.nr % 0
|
.nr % 0
|
||||||
.rr F
|
.rr F
|
||||||
.\}
|
.\}
|
||||||
.TH sudoers @mansectform@ "1.6.3" "22/Mar/2000" "FILE FORMATS"
|
.TH sudoers @mansectform@ "1.6.3" "26/Mar/2000" "FILE FORMATS"
|
||||||
.UC
|
.UC
|
||||||
.if n .hy 0
|
.if n .hy 0
|
||||||
.if n .na
|
.if n .na
|
||||||
@@ -977,7 +977,7 @@ as returned by the \f(CWhostname\fR command or use the \fIfqdn\fR option in
|
|||||||
\& /etc/netgroup List of network groups
|
\& /etc/netgroup List of network groups
|
||||||
.Ve
|
.Ve
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
\fIsudo\fR\|(8), \fIvisudo\fR\|(8), \fIsu\fR\|(1), \fIfnmatch\fR\|(3).
|
\fIsudo\fR\|(@mansectsu@), \fIvisudo\fR\|(@mansectsu@), \fIsu\fR\|(1), \fIfnmatch\fR\|(3).
|
||||||
|
|
||||||
.rn }` ''
|
.rn }` ''
|
||||||
.IX Title "sudoers @mansectform@"
|
.IX Title "sudoers @mansectform@"
|
||||||
|
@@ -927,4 +927,4 @@ I<sudoers>.
|
|||||||
|
|
||||||
=head1 SEE ALSO
|
=head1 SEE ALSO
|
||||||
|
|
||||||
sudo(8), visudo(8), su(1), fnmatch(3).
|
sudo(@mansectsu@), visudo(@mansectsu@), su(1), fnmatch(3).
|
||||||
|
@@ -12,7 +12,7 @@ SSSSYYYYNNNNOOOOPPPPSSSSIIIISSSS
|
|||||||
|
|
||||||
DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN
|
DDDDEEEESSSSCCCCRRRRIIIIPPPPTTTTIIIIOOOONNNN
|
||||||
vvvviiiissssuuuuddddoooo edits the _s_u_d_o_e_r_s file in a safe fashion, analogous
|
vvvviiiissssuuuuddddoooo edits the _s_u_d_o_e_r_s file in a safe fashion, analogous
|
||||||
to _v_i_p_w(8). vvvviiiissssuuuuddddoooo locks the _s_u_d_o_e_r_s file against
|
to _v_i_p_w(1m). vvvviiiissssuuuuddddoooo locks the _s_u_d_o_e_r_s file against
|
||||||
multiple simultaneous edits, provides basic sanity checks,
|
multiple simultaneous edits, provides basic sanity checks,
|
||||||
and checks for parse errors. If the _s_u_d_o_e_r_s file is
|
and checks for parse errors. If the _s_u_d_o_e_r_s file is
|
||||||
currently being edited you will receive a message to try
|
currently being edited you will receive a message to try
|
||||||
@@ -120,7 +120,7 @@ CCCCAAAAVVVVEEEEAAAATTTTSSSS
|
|||||||
shell if the editor used by vvvviiiissssuuuuddddoooo allows shell escapes.
|
shell if the editor used by vvvviiiissssuuuuddddoooo allows shell escapes.
|
||||||
|
|
||||||
SSSSEEEEEEEE AAAALLLLSSSSOOOO
|
SSSSEEEEEEEE AAAALLLLSSSSOOOO
|
||||||
_s_u_d_o(8), _v_i_p_w(8).
|
_s_u_d_o(1m), _v_i_p_w(1m).
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@@ -2,8 +2,8 @@
|
|||||||
''' $RCSfile$$Revision$$Date$
|
''' $RCSfile$$Revision$$Date$
|
||||||
'''
|
'''
|
||||||
''' $Log$
|
''' $Log$
|
||||||
''' Revision 1.3 2000/03/27 03:07:35 millert
|
''' Revision 1.4 2000/03/27 03:26:24 millert
|
||||||
''' Typo: @sysconf@ -> @sysconfdir@
|
''' Use @mansectsu@ and @mansectform@ in the man page bodies as well.
|
||||||
'''
|
'''
|
||||||
'''
|
'''
|
||||||
.de Sh
|
.de Sh
|
||||||
@@ -196,7 +196,7 @@ visudo \- edit the sudoers file
|
|||||||
\fBvisudo\fR [ \fB\-s\fR ] [ \fB\-V\fR ]
|
\fBvisudo\fR [ \fB\-s\fR ] [ \fB\-V\fR ]
|
||||||
.SH "DESCRIPTION"
|
.SH "DESCRIPTION"
|
||||||
\fBvisudo\fR edits the \fIsudoers\fR file in a safe fashion, analogous to
|
\fBvisudo\fR edits the \fIsudoers\fR file in a safe fashion, analogous to
|
||||||
\fIvipw\fR\|(8). \fBvisudo\fR locks the \fIsudoers\fR file against multiple
|
\fIvipw\fR\|(@mansectsu@). \fBvisudo\fR locks the \fIsudoers\fR file against multiple
|
||||||
simultaneous edits, provides basic sanity checks, and checks
|
simultaneous edits, provides basic sanity checks, and checks
|
||||||
for parse errors. If the \fIsudoers\fR file is currently being
|
for parse errors. If the \fIsudoers\fR file is currently being
|
||||||
edited you will receive a message to try again later. In the
|
edited you will receive a message to try again later. In the
|
||||||
@@ -277,7 +277,7 @@ See the LICENSE file distributed with \fBsudo\fR for complete details.
|
|||||||
There is no easy way to prevent a user from gaining a root shell if
|
There is no easy way to prevent a user from gaining a root shell if
|
||||||
the editor used by \fBvisudo\fR allows shell escapes.
|
the editor used by \fBvisudo\fR allows shell escapes.
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
\fIsudo\fR\|(8), \fIvipw\fR\|(8).
|
\fIsudo\fR\|(@mansectsu@), \fIvipw\fR\|(@mansectsu@).
|
||||||
|
|
||||||
.rn }` ''
|
.rn }` ''
|
||||||
.IX Title "visudo @mansectsu@"
|
.IX Title "visudo @mansectsu@"
|
||||||
|
@@ -46,7 +46,7 @@ B<visudo> [ B<-s> ] [ B<-V> ]
|
|||||||
=head1 DESCRIPTION
|
=head1 DESCRIPTION
|
||||||
|
|
||||||
B<visudo> edits the I<sudoers> file in a safe fashion, analogous to
|
B<visudo> edits the I<sudoers> file in a safe fashion, analogous to
|
||||||
vipw(8). B<visudo> locks the I<sudoers> file against multiple
|
vipw(@mansectsu@). B<visudo> locks the I<sudoers> file against multiple
|
||||||
simultaneous edits, provides basic sanity checks, and checks
|
simultaneous edits, provides basic sanity checks, and checks
|
||||||
for parse errors. If the I<sudoers> file is currently being
|
for parse errors. If the I<sudoers> file is currently being
|
||||||
edited you will receive a message to try again later. In the
|
edited you will receive a message to try again later. In the
|
||||||
@@ -158,4 +158,4 @@ the editor used by B<visudo> allows shell escapes.
|
|||||||
|
|
||||||
=head1 SEE ALSO
|
=head1 SEE ALSO
|
||||||
|
|
||||||
sudo(8), vipw(8).
|
sudo(@mansectsu@), vipw(@mansectsu@).
|
||||||
|
Reference in New Issue
Block a user