From: Todd C. Miller Date: Wed, 14 Jul 2010 13:09:23 +0000 (-0400) Subject: Remove spurious "and"; from debian X-Git-Tag: SUDO_1_7_4~89 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=20c13f8d7a9b8688df18e74c1cbf0087e388b176;p=sudo Remove spurious "and"; from debian --HG-- branch : 1.7 --- diff --git a/sudoers.cat b/sudoers.cat index 526f907ee..037afadeb 100644 --- a/sudoers.cat +++ b/sudoers.cat @@ -818,7 +818,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4) this prevents users from "chaining" ssuuddoo commands to get a root shell by doing something like "sudo sudo /bin/sh". Note, however, that turning off _r_o_o_t___s_u_d_o - will also prevent root and from running ssuuddooeeddiitt. + will also prevent root from running ssuuddooeeddiitt. Disabling _r_o_o_t___s_u_d_o provides no real additional security; it exists purely for historical reasons. This flag is _o_n by default. diff --git a/sudoers.man.in b/sudoers.man.in index 98e361eca..d5dc104cf 100644 --- a/sudoers.man.in +++ b/sudoers.man.in @@ -909,7 +909,7 @@ This flag is \fIoff\fR by default. If set, root is allowed to run \fBsudo\fR too. Disabling this prevents users from \*(L"chaining\*(R" \fBsudo\fR commands to get a root shell by doing something like \f(CW"sudo sudo /bin/sh"\fR. Note, however, that turning off \fIroot_sudo\fR -will also prevent root and from running \fBsudoedit\fR. +will also prevent root from running \fBsudoedit\fR. Disabling \fIroot_sudo\fR provides no real additional security; it exists purely for historical reasons. This flag is \fI@root_sudo@\fR by default. diff --git a/sudoers.pod b/sudoers.pod index ba3f527bd..c750470c5 100644 --- a/sudoers.pod +++ b/sudoers.pod @@ -792,7 +792,7 @@ This flag is I by default. If set, root is allowed to run B too. Disabling this prevents users from "chaining" B commands to get a root shell by doing something like C<"sudo sudo /bin/sh">. Note, however, that turning off I -will also prevent root and from running B. +will also prevent root from running B. Disabling I provides no real additional security; it exists purely for historical reasons. This flag is I<@root_sudo@> by default.