diff --git a/etc/permission-hardening.d/25_default_sudo.conf b/etc/permission-hardening.d/25_default_sudo.conf index 32425c1..16cfa2b 100644 --- a/etc/permission-hardening.d/25_default_sudo.conf +++ b/etc/permission-hardening.d/25_default_sudo.conf @@ -15,6 +15,6 @@ ## With this restriction, only users explicitly permitted to use sudo by being added to ## the "sudo" group could exploit such vulnerabilities. For example, this would prevent a ## compromised network-facing daemon (such as web servers, time synchronization daemons, -## etc.) running as its own user from exploiting sudo to escalate privileges. +## etc.) running as its own user from exploiting sudo to escalate privileges. #/usr/bin/sudo 4750 root sudo #/bin/sudo 4750 root sudo