- Timestamp:
- 12/22/2005 03:32:33 AM (18 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 12.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/TL2024, ken/inkscape-core-mods, ken/tuningfonts, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/newcss, plabs/python-mods, python3.11, qt5new, rahul/power-profiles-daemon, renodr/vulkan-addition, systemd-11177, systemd-13485, trunk, upgradedb, xry111/intltool, xry111/llvm18, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- 2130862
- Parents:
- 589e525
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
postlfs/security/sudo.xml
r589e525 r3c0f868f 84 84 the following commands:</para> 85 85 86 <screen><userinput>sed -i -e 's/CDPATH",/&\n "SHELLOPTS",\n "PS4",/' env.c 87 ./configure --prefix=/usr --libexecdir=/usr/lib \ 86 <screen><userinput>./configure --prefix=/usr --libexecdir=/usr/lib \ 88 87 --enable-noargs-shell --with-ignore-dot --with-all-insults \ 89 88 --enable-shell-sets-home && … … 98 97 <sect2 role="commands"> 99 98 <title>Command Explanations</title> 100 101 <para><command>sed -i -e 's/CDPATH",/&\n "SHELLOPTS",\n "PS4",/'102 env.c</command>: This command adds two environment variables to a list of103 variables to be excluded from the target environment. It solves a104 security problem.</para>105 99 106 100 <para><option>--enable-noargs-shell</option>: This switch allows … … 160 154 <para>For details, see <command>man sudoers</command>.</para> 161 155 156 <note> 157 <para>The <application>Sudo</application> developers highly recommend 158 using the <command>visudo</command> program to edit the 159 <filename>sudoers</filename> file. This will provide basic sanity 160 checking like syntax parsing and file permission to avoid some possible 161 mistakes that could lead to a vulnerable configuration.</para> 162 </note> 163 162 164 </sect3> 163 165 … … 173 175 174 176 <seglistitem> 175 <seg>sudo and sudoedit</seg>177 <seg>sudo, sudoedit, and visudo</seg> 176 178 <seg>sudo_noexec.so</seg> 177 179 <seg>None</seg> … … 208 210 </varlistentry> 209 211 212 <varlistentry id="visudo"> 213 <term><command>visudo</command></term> 214 <listitem> 215 <para>allows for safer editing of the <filename>sudoers</filename> 216 file.</para> 217 <indexterm zone="sudo visudo"> 218 <primary sortas="b-visudo">visudo</primary> 219 </indexterm> 220 </listitem> 221 </varlistentry> 222 223 210 224 <varlistentry id="sudo_noexec"> 211 225 <term><filename class='libraryfile'>sudo_noexec.so</filename></term>
Note:
See TracChangeset
for help on using the changeset viewer.