regen
This commit is contained in:
66
sudoers.cat
66
sudoers.cat
@@ -61,7 +61,7 @@ DDEESSCCRRIIPPTTIIOONN
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 1
|
||||
1.6.8 June 8, 2004 1
|
||||
|
||||
|
||||
|
||||
@@ -127,7 +127,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 2
|
||||
1.6.8 June 8, 2004 2
|
||||
|
||||
|
||||
|
||||
@@ -193,7 +193,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 3
|
||||
1.6.8 June 8, 2004 3
|
||||
|
||||
|
||||
|
||||
@@ -259,7 +259,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 4
|
||||
1.6.8 June 8, 2004 4
|
||||
|
||||
|
||||
|
||||
@@ -325,7 +325,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 5
|
||||
1.6.8 June 8, 2004 5
|
||||
|
||||
|
||||
|
||||
@@ -391,7 +391,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 6
|
||||
1.6.8 June 8, 2004 6
|
||||
|
||||
|
||||
|
||||
@@ -457,7 +457,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 7
|
||||
1.6.8 June 8, 2004 7
|
||||
|
||||
|
||||
|
||||
@@ -523,7 +523,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 8
|
||||
1.6.8 June 8, 2004 8
|
||||
|
||||
|
||||
|
||||
@@ -589,7 +589,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 9
|
||||
1.6.8 June 8, 2004 9
|
||||
|
||||
|
||||
|
||||
@@ -655,7 +655,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 10
|
||||
1.6.8 June 8, 2004 10
|
||||
|
||||
|
||||
|
||||
@@ -721,7 +721,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 11
|
||||
1.6.8 June 8, 2004 11
|
||||
|
||||
|
||||
|
||||
@@ -787,7 +787,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 12
|
||||
1.6.8 June 8, 2004 12
|
||||
|
||||
|
||||
|
||||
@@ -853,7 +853,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 13
|
||||
1.6.8 June 8, 2004 13
|
||||
|
||||
|
||||
|
||||
@@ -919,7 +919,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 14
|
||||
1.6.8 June 8, 2004 14
|
||||
|
||||
|
||||
|
||||
@@ -985,7 +985,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 15
|
||||
1.6.8 June 8, 2004 15
|
||||
|
||||
|
||||
|
||||
@@ -1051,7 +1051,7 @@ EEXXAAMMPPLLEESS
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 16
|
||||
1.6.8 June 8, 2004 16
|
||||
|
||||
|
||||
|
||||
@@ -1117,7 +1117,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 17
|
||||
1.6.8 June 8, 2004 17
|
||||
|
||||
|
||||
|
||||
@@ -1183,7 +1183,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 18
|
||||
1.6.8 June 8, 2004 18
|
||||
|
||||
|
||||
|
||||
@@ -1249,7 +1249,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 19
|
||||
1.6.8 June 8, 2004 19
|
||||
|
||||
|
||||
|
||||
@@ -1301,7 +1301,7 @@ PPRREEVVEENNTTIINNGG SSHHEELLLL EESSCCAAPPEESS
|
||||
To tell whether or not ssuuddoo supports _n_o_e_x_e_c, you can run
|
||||
the following as root:
|
||||
|
||||
\# sudo -V | grep "dummy exec"
|
||||
sudo -V | grep "dummy exec"
|
||||
|
||||
If the resulting output contains a line that begins with:
|
||||
|
||||
@@ -1315,7 +1315,7 @@ PPRREEVVEENNTTIINNGG SSHHEELLLL EESSCCAAPPEESS
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 20
|
||||
1.6.8 June 8, 2004 20
|
||||
|
||||
|
||||
|
||||
@@ -1333,10 +1333,17 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4)
|
||||
ported.
|
||||
|
||||
To enable _n_o_e_x_e_c for a command, use the NOEXEC tag as doc<6F>
|
||||
umented in the User Specification section above. If you
|
||||
are unsure whether or not your system is capable of sup<75>
|
||||
porting _n_o_e_x_e_c you can always just try it out and see if
|
||||
it works.
|
||||
umented in the User Specification section above. Here is
|
||||
that example again:
|
||||
|
||||
aaron shanty = NOEXEC: /usr/bin/more, /usr/bin/vi
|
||||
|
||||
This allows user aaaarroonn to run _/_u_s_r_/_b_i_n_/_m_o_r_e and
|
||||
_/_u_s_r_/_b_i_n_/_v_i with _n_o_e_x_e_c enabled. This will prevent those
|
||||
two commands from executing other commands (such as a
|
||||
shell). If you are unsure whether or not your system is
|
||||
capable of supporting _n_o_e_x_e_c you can always just try it
|
||||
out and see if it works.
|
||||
|
||||
Note that disabling shell escapes is not a panacea. Pro<72>
|
||||
grams running as root are still capable of many poten<65>
|
||||
@@ -1374,13 +1381,6 @@ SSEEEE AALLSSOO
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
1.6.8 June 6, 2004 21
|
||||
1.6.8 June 8, 2004 21
|
||||
|
||||
|
||||
|
@@ -149,7 +149,7 @@
|
||||
.\" ========================================================================
|
||||
.\"
|
||||
.IX Title "SUDOERS @mansectform@"
|
||||
.TH SUDOERS @mansectform@ "June 6, 2004" "1.6.8" "MAINTENANCE COMMANDS"
|
||||
.TH SUDOERS @mansectform@ "June 8, 2004" "1.6.8" "MAINTENANCE COMMANDS"
|
||||
.SH "NAME"
|
||||
sudoers \- list of which users may execute what
|
||||
.SH "DESCRIPTION"
|
||||
@@ -1283,7 +1283,7 @@ To tell whether or not \fBsudo\fR supports \fInoexec\fR, you can run
|
||||
the following as root:
|
||||
.PP
|
||||
.Vb 1
|
||||
\& \e# sudo -V | grep "dummy exec"
|
||||
\& sudo -V | grep "dummy exec"
|
||||
.Ve
|
||||
.PP
|
||||
If the resulting output contains a line that begins with:
|
||||
@@ -1304,9 +1304,17 @@ manual pages for the dynamic linker (usually ld.so, ld.so.1, dyld,
|
||||
dld.sl, rld, or loader) to see if \f(CW\*(C`LD_PRELOAD\*(C'\fR is supported.
|
||||
.PP
|
||||
To enable \fInoexec\fR for a command, use the \f(CW\*(C`NOEXEC\*(C'\fR tag as documented
|
||||
in the User Specification section above. If you are unsure whether
|
||||
or not your system is capable of supporting \fInoexec\fR you can always
|
||||
just try it out and see if it works.
|
||||
in the User Specification section above. Here is that example again:
|
||||
.PP
|
||||
.Vb 1
|
||||
\& aaron shanty = NOEXEC: /usr/bin/more, /usr/bin/vi
|
||||
.Ve
|
||||
.PP
|
||||
This allows user \fBaaron\fR to run \fI/usr/bin/more\fR and \fI/usr/bin/vi\fR
|
||||
with \fInoexec\fR enabled. This will prevent those two commands from
|
||||
executing other commands (such as a shell). If you are unsure
|
||||
whether or not your system is capable of supporting \fInoexec\fR you
|
||||
can always just try it out and see if it works.
|
||||
.PP
|
||||
Note that disabling shell escapes is not a panacea. Programs running
|
||||
as root are still capable of many potentially hazardous operations
|
||||
|
Reference in New Issue
Block a user