From: Todd C. Miller Date: Wed, 14 Jul 2010 13:34:39 +0000 (-0400) Subject: Remove spurious "and"; from debian X-Git-Tag: SUDO_1_8_0~389 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=de3cfa25f4fc095f4fe41ce528445cee59135c7e;p=sudo Remove spurious "and"; from debian --- diff --git a/doc/sudoers.cat b/doc/sudoers.cat index 4fb40ca3e..4e74211f8 100644 --- a/doc/sudoers.cat +++ b/doc/sudoers.cat @@ -936,7 +936,7 @@ SUDOERS(4) MAINTENANCE COMMANDS SUDOERS(4) this prevents users from "chaining" ssuuddoo commands to get a root shell by doing something like "sudo sudo /bin/sh". Note, however, that turning off _r_o_o_t___s_u_d_o - will also prevent root and from running ssuuddooeeddiitt. + will also prevent root from running ssuuddooeeddiitt. Disabling _r_o_o_t___s_u_d_o provides no real additional security; it exists purely for historical reasons. This flag is _o_n by default. diff --git a/doc/sudoers.man.in b/doc/sudoers.man.in index ee25340f5..71ca1697b 100644 --- a/doc/sudoers.man.in +++ b/doc/sudoers.man.in @@ -1006,7 +1006,7 @@ This flag is \fIoff\fR by default. If set, root is allowed to run \fBsudo\fR too. Disabling this prevents users from \*(L"chaining\*(R" \fBsudo\fR commands to get a root shell by doing something like \f(CW"sudo sudo /bin/sh"\fR. Note, however, that turning off \fIroot_sudo\fR -will also prevent root and from running \fBsudoedit\fR. +will also prevent root from running \fBsudoedit\fR. Disabling \fIroot_sudo\fR provides no real additional security; it exists purely for historical reasons. This flag is \fI@root_sudo@\fR by default. diff --git a/doc/sudoers.pod b/doc/sudoers.pod index 2fb2f7ca0..28327cc10 100644 --- a/doc/sudoers.pod +++ b/doc/sudoers.pod @@ -892,7 +892,7 @@ This flag is I by default. If set, root is allowed to run B too. Disabling this prevents users from "chaining" B commands to get a root shell by doing something like C<"sudo sudo /bin/sh">. Note, however, that turning off I -will also prevent root and from running B. +will also prevent root from running B. Disabling I provides no real additional security; it exists purely for historical reasons. This flag is I<@root_sudo@> by default.