summaryrefslogtreecommitdiff
path: root/usr.bin/sudo/sudoers.5
diff options
context:
space:
mode:
Diffstat (limited to 'usr.bin/sudo/sudoers.5')
-rw-r--r--usr.bin/sudo/sudoers.510
1 files changed, 7 insertions, 3 deletions
diff --git a/usr.bin/sudo/sudoers.5 b/usr.bin/sudo/sudoers.5
index 5b9a13dab23..fb68fb888ed 100644
--- a/usr.bin/sudo/sudoers.5
+++ b/usr.bin/sudo/sudoers.5
@@ -1,5 +1,5 @@
.\" Automatically generated by Pod::Man version 1.15
-.\" Sun Dec 30 12:24:30 2001
+.\" Sun Jan 13 11:37:06 2002
.\"
.\" Standard preamble:
.\" ======================================================================
@@ -138,7 +138,7 @@
.\" ======================================================================
.\"
.IX Title "sudoers 5"
-.TH sudoers 5 "1.6.4" "December 30, 2001" "MAINTENANCE COMMANDS"
+.TH sudoers 5 "1.6.4" "January 13, 2002" "MAINTENANCE COMMANDS"
.UC
.SH "NAME"
sudoers \- list of which users may execute what
@@ -513,7 +513,11 @@ UIDs are set to the target user (root by default). This option
changes that behavior such that the real \s-1UID\s0 is left as the invoking
user's \s-1UID\s0. In other words, this makes \fBsudo\fR act as a setuid
wrapper. This can be useful on systems that disable some potentially
-dangerous functionality when a program is run setuid.
+dangerous functionality when a program is run setuid. Note, however,
+that this means that sudo will run with the real uid of the invoking
+user which may allow that user to kill \fBsudo\fR before it can log a
+failure, depending on how your \s-1OS\s0 defines the interaction between
+signals and setuid processes.
.Ip "env_reset" 12
.IX Item "env_reset"
If set, \fBsudo\fR will reset the environment to only contain the