From: Todd C. Miller Date: Tue, 8 Jun 2004 23:19:48 +0000 (+0000) Subject: Expand on NOEXEC a little. X-Git-Tag: SUDO_1_6_8~48 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=fc1dea2ed362da1b48e9ea52142a09d033f95b7d;p=sudo Expand on NOEXEC a little. --- diff --git a/sudoers.pod b/sudoers.pod index b455592a1..dbc3e59bc 100644 --- a/sudoers.pod +++ b/sudoers.pod @@ -1152,7 +1152,7 @@ running under binary emulation are not affected. To tell whether or not B supports I, you can run the following as root: - \# sudo -V | grep "dummy exec" + sudo -V | grep "dummy exec" If the resulting output contains a line that begins with: @@ -1170,9 +1170,15 @@ manual pages for the dynamic linker (usually ld.so, ld.so.1, dyld, dld.sl, rld, or loader) to see if C is supported. To enable I for a command, use the C tag as documented -in the User Specification section above. If you are unsure whether -or not your system is capable of supporting I you can always -just try it out and see if it works. +in the User Specification section above. Here is that example again: + + aaron shanty = NOEXEC: /usr/bin/more, /usr/bin/vi + +This allows user B to run F and F +with I enabled. This will prevent those two commands from +executing other commands (such as a shell). If you are unsure +whether or not your system is capable of supporting I you +can always just try it out and see if it works. Note that disabling shell escapes is not a panacea. Programs running as root are still capable of many potentially hazardous operations