Home Explore Blog CI



man-pages

15th chunk of `sudo.man`
d54bde3ead02cb74167276752b0d46ff99676da86c5334070000000100000bf6
         It is only possible to run sudoedit on systems that  support  set‐
             ting the effective user‐ID.

       timed out reading password
             The  user  did not enter a password before the password timeout (5
             minutes by default) expired.

       you do not exist in the passwd database
             Your user‐ID does not appear in the system passwd database.

       you may not specify environment variables in edit mode
             It is only possible to specify environment variables when  running
             a command.  When editing a file, the editor is run with the user’s
             environment unmodified.

SEE ALSO
       su(1),  stat(2),  login_cap(3), passwd(5), sudo.conf(5), sudo_plugin(5),
       sudoers(5), sudoers_timestamp(5), sudoreplay(8), visudo(8)

HISTORY
       See    the    HISTORY.md    file    in     the     sudo     distribution
       (https://www.sudo.ws/about/history/) for a brief history of sudo.

AUTHORS
       Many people have worked on sudo over the years; this version consists of
       code written primarily by:

             Todd C. Miller

       See    the    CONTRIBUTORS.md    file    in    the   sudo   distribution
       (https://www.sudo.ws/about/contributors/) for an exhaustive list of peo‐
       ple who have contributed to sudo.

CAVEATS
       There is no easy way to prevent a user from gaining a root shell if that
       user is allowed to run arbitrary commands via sudo.  Also, many programs
       (such as editors) allow the user to run commands via shell escapes, thus
       avoiding sudo’s checks.  However, on most systems it is possible to pre‐
       vent shell escapes with the sudoers(5) plugin’s noexec functionality.

       It is not meaningful to run the ‘cd’ command directly via sudo, e.g.,

           $ sudo cd /usr/local/protected

       since when the command exits the parent process (your shell) will  still
       be  the  same.  The -D option can be used to run a command in a specific
       directory.

       Running shell scripts via sudo can expose the same kernel bugs that make
       set‐user‐ID shell scripts unsafe on some operating systems (if  your  OS
       has a /dev/fd/ directory, set‐user‐ID shell scripts are generally safe).

BUGS
       If you believe you have found a bug in sudo, you can submit a bug report
       at https://bugzilla.sudo.ws/

SUPPORT
       Limited  free  support is available via the sudo‐users mailing list, see
       https://www.sudo.ws/mailman/listinfo/sudo‐users to subscribe  or  search
       the archives.

DISCLAIMER
       sudo  is provided “AS IS” and any express or implied warranties, includ‐
       ing, but not limited to, the implied warranties of  merchantability  and
       fitness  for  a  particular  purpose are disclaimed.  See the LICENSE.md
       file distributed with  sudo  or  https://www.sudo.ws/about/license/  for
       complete details.

Sudo 1.9.14p2                    June 18, 2023                          SUDO(8)

Title: Sudo Diagnostics, Authors, Caveats, Bugs, Support, and Disclaimer
Summary
This section details various sudo diagnostic messages, including issues with sudoedit, password timeouts, missing users, and environment variables. It acknowledges the authors and contributors, provides caveats regarding security risks with sudo and shell scripts, and explains limitations of running certain commands directly via sudo. Bug reporting, support resources, and a disclaimer are also included.