=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/sudo/Attic/sudoers.5,v retrieving revision 1.8.2.1 retrieving revision 1.9 diff -u -r1.8.2.1 -r1.9 --- src/usr.bin/sudo/Attic/sudoers.5 2002/01/18 16:14:46 1.8.2.1 +++ src/usr.bin/sudo/Attic/sudoers.5 2002/01/03 03:49:16 1.9 @@ -1,5 +1,5 @@ .\" Automatically generated by Pod::Man version 1.15 -.\" Wed Jan 16 16:36:10 2002 +.\" Sun Dec 30 12:24:30 2001 .\" .\" Standard preamble: .\" ====================================================================== @@ -138,7 +138,7 @@ .\" ====================================================================== .\" .IX Title "sudoers 5" -.TH sudoers 5 "1.6.5" "January 16, 2002" "MAINTENANCE COMMANDS" +.TH sudoers 5 "1.6.4" "December 30, 2001" "MAINTENANCE COMMANDS" .UC .SH "NAME" sudoers \- list of which users may execute what @@ -513,11 +513,7 @@ changes that behavior such that the real \s-1UID\s0 is left as the invoking user's \s-1UID\s0. In other words, this makes \fBsudo\fR act as a setuid wrapper. This can be useful on systems that disable some potentially -dangerous functionality when a program is run setuid. Note, however, -that this means that sudo will run with the real uid of the invoking -user which may allow that user to kill \fBsudo\fR before it can log a -failure, depending on how your \s-1OS\s0 defines the interaction between -signals and setuid processes. +dangerous functionality when a program is run setuid. .Ip "env_reset" 12 .IX Item "env_reset" If set, \fBsudo\fR will reset the environment to only contain the