From 9c98d0f4a5834e7a50d86d55c60abdc07fbff799 Mon Sep 17 00:00:00 2001 From: "Todd C. Miller" Date: Mon, 28 Apr 2025 12:26:52 -0600 Subject: [PATCH] Regenerate man format manuals --- docs/cvtsudoers.man.in | 2 +- docs/sudo.conf.man.in | 20 ++++++++++---------- docs/sudo.man.in | 2 +- docs/sudo_logsrv.proto.man.in | 6 +++--- docs/sudo_logsrvd.conf.man.in | 2 +- docs/sudo_logsrvd.man.in | 2 +- docs/sudo_plugin.man.in | 2 +- docs/sudo_plugin_python.man.in | 2 +- docs/sudo_sendlog.man.in | 2 +- docs/sudoers.ldap.man.in | 6 +++--- docs/sudoers.man.in | 2 +- docs/sudoers_timestamp.man.in | 2 +- docs/sudoreplay.man.in | 2 +- docs/visudo.man.in | 2 +- 14 files changed, 27 insertions(+), 27 deletions(-) diff --git a/docs/cvtsudoers.man.in b/docs/cvtsudoers.man.in index 47eb1cb35..aa326b25f 100644 --- a/docs/cvtsudoers.man.in +++ b/docs/cvtsudoers.man.in @@ -1391,7 +1391,7 @@ sudo-workers mailing list, https://www.sudo.ws/mailman/listinfo/sudo-workers (public) or (private). .PP -Please not report security vulnerabilities through public GitHub +Please do not report security vulnerabilities through public GitHub issues, Bugzilla or mailing lists. Instead, report them via email to . You may encrypt your message with PGP if you would like, using diff --git a/docs/sudo.conf.man.in b/docs/sudo.conf.man.in index 6f6127d45..7d1ae2218 100644 --- a/docs/sudo.conf.man.in +++ b/docs/sudo.conf.man.in @@ -255,7 +255,7 @@ The following plugin-agnostic paths may be set in the file: .TP 6n askpass -The fully qualified path to a helper program used to read the user's +The fully-qualified path to a helper program used to read the user's password when no terminal is available. This may be the case when \fBsudo\fR @@ -294,7 +294,7 @@ BSD, macOS and Solaris. .TP 6n intercept -The path to a shared library containing a wrappers for the +The path to a shared library containing wrappers for the execve(2), execl(3), execle(3), @@ -372,7 +372,7 @@ The default value is .TP 6n plugin_dir The default directory to use when searching for plugins -that are specified without a fully qualified path name. +that are specified without a fully-qualified path name. The default value is \fI@plugindir@\fR. .if \n(SL \{\ @@ -803,11 +803,11 @@ front-end configuration # Sudo command interception: # Path intercept /path/to/sudo_intercept.so # -# Path to a shared library containing replacements for the execv() -# and execve() library functions that perform a policy check to verify -# the command is allowed and simply return an error if not. This is -# used to implement the "intercept" functionality on systems that -# support LD_PRELOAD or its equivalent. +# Path to a shared library containing replacements for the execv(), +# execve() and fexecve() library functions, which perform a policy +# check to verify whether the command is allowed and simply return +# an error if it is not. This is used to implement the "intercept" +# functionality on systems that support LD_PRELOAD or its equivalent. # # The compiled-in value is usually sufficient and should only be changed # if you rename or move the sudo_intercept.so file. @@ -833,7 +833,7 @@ front-end configuration # Path plugin_dir /path/to/plugins # # The default directory to use when searching for plugins that are -# specified without a fully qualified path name. +# specified without a fully-qualified path name. # #Path plugin_dir @plugindir@ @@ -921,7 +921,7 @@ sudo-workers mailing list, https://www.sudo.ws/mailman/listinfo/sudo-workers (public) or (private). .PP -Please not report security vulnerabilities through public GitHub +Please do not report security vulnerabilities through public GitHub issues, Bugzilla or mailing lists. Instead, report them via email to . You may encrypt your message with PGP if you would like, using diff --git a/docs/sudo.man.in b/docs/sudo.man.in index 87bd2deef..110f9c719 100644 --- a/docs/sudo.man.in +++ b/docs/sudo.man.in @@ -1783,7 +1783,7 @@ sudo-workers mailing list, https://www.sudo.ws/mailman/listinfo/sudo-workers (public) or (private). .PP -Please not report security vulnerabilities through public GitHub +Please do not report security vulnerabilities through public GitHub issues, Bugzilla or mailing lists. Instead, report them via email to . You may encrypt your message with PGP if you would like, using diff --git a/docs/sudo_logsrv.proto.man.in b/docs/sudo_logsrv.proto.man.in index 6d2939def..cd94fb02b 100644 --- a/docs/sudo_logsrv.proto.man.in +++ b/docs/sudo_logsrv.proto.man.in @@ -290,7 +290,7 @@ was previously interrupted. It contains the following members: .TP 8n log_id -The the server-side name for an I/O log that was previously +The server-side name for an I/O log that was previously sent to the client by the server. This may be a path name on the server or some other kind of server-side identifier. @@ -876,7 +876,7 @@ sudo(8), sudo_logsrvd(8) .PP \fIProtocol Buffers\fR, -https://developers.google.com/protocol-buffers/. +https://protobuf.dev/. .SH "AUTHORS" Many people have worked on \fBsudo\fR @@ -902,7 +902,7 @@ sudo-workers mailing list, https://www.sudo.ws/mailman/listinfo/sudo-workers (public) or (private). .PP -Please not report security vulnerabilities through public GitHub +Please do not report security vulnerabilities through public GitHub issues, Bugzilla or mailing lists. Instead, report them via email to . You may encrypt your message with PGP if you would like, using diff --git a/docs/sudo_logsrvd.conf.man.in b/docs/sudo_logsrvd.conf.man.in index ac18ad74d..a02f4e6b3 100644 --- a/docs/sudo_logsrvd.conf.man.in +++ b/docs/sudo_logsrvd.conf.man.in @@ -1148,7 +1148,7 @@ sudo-workers mailing list, https://www.sudo.ws/mailman/listinfo/sudo-workers (public) or (private). .PP -Please not report security vulnerabilities through public GitHub +Please do not report security vulnerabilities through public GitHub issues, Bugzilla or mailing lists. Instead, report them via email to . You may encrypt your message with PGP if you would like, using diff --git a/docs/sudo_logsrvd.man.in b/docs/sudo_logsrvd.man.in index 788ca212f..8a9095fca 100644 --- a/docs/sudo_logsrvd.man.in +++ b/docs/sudo_logsrvd.man.in @@ -471,7 +471,7 @@ sudo-workers mailing list, https://www.sudo.ws/mailman/listinfo/sudo-workers (public) or (private). .PP -Please not report security vulnerabilities through public GitHub +Please do not report security vulnerabilities through public GitHub issues, Bugzilla or mailing lists. Instead, report them via email to . You may encrypt your message with PGP if you would like, using diff --git a/docs/sudo_plugin.man.in b/docs/sudo_plugin.man.in index d0acb0023..d6643d1b5 100644 --- a/docs/sudo_plugin.man.in +++ b/docs/sudo_plugin.man.in @@ -5518,7 +5518,7 @@ sudo-workers mailing list, https://www.sudo.ws/mailman/listinfo/sudo-workers (public) or (private). .PP -Please not report security vulnerabilities through public GitHub +Please do not report security vulnerabilities through public GitHub issues, Bugzilla or mailing lists. Instead, report them via email to . You may encrypt your message with PGP if you would like, using diff --git a/docs/sudo_plugin_python.man.in b/docs/sudo_plugin_python.man.in index 7e1db174e..9339d500c 100644 --- a/docs/sudo_plugin_python.man.in +++ b/docs/sudo_plugin_python.man.in @@ -1880,7 +1880,7 @@ sudo-workers mailing list, https://www.sudo.ws/mailman/listinfo/sudo-workers (public) or (private). .PP -Please not report security vulnerabilities through public GitHub +Please do not report security vulnerabilities through public GitHub issues, Bugzilla or mailing lists. Instead, report them via email to . You may encrypt your message with PGP if you would like, using diff --git a/docs/sudo_sendlog.man.in b/docs/sudo_sendlog.man.in index 4992b3c64..1eaa66a0e 100644 --- a/docs/sudo_sendlog.man.in +++ b/docs/sudo_sendlog.man.in @@ -196,7 +196,7 @@ sudo-workers mailing list, https://www.sudo.ws/mailman/listinfo/sudo-workers (public) or (private). .PP -Please not report security vulnerabilities through public GitHub +Please do not report security vulnerabilities through public GitHub issues, Bugzilla or mailing lists. Instead, report them via email to . You may encrypt your message with PGP if you would like, using diff --git a/docs/sudoers.ldap.man.in b/docs/sudoers.ldap.man.in index 6bb2c02a2..25d62612a 100644 --- a/docs/sudoers.ldap.man.in +++ b/docs/sudoers.ldap.man.in @@ -170,7 +170,7 @@ option (or as It may take command line arguments just as a normal command does. Unlike other commands, \(lqsudoedit\(rq -is a built into +is built into \fBsudo\fR itself and must be specified in without a leading path. .sp @@ -420,7 +420,7 @@ The query will match \fInisNetgroupTriple\fR entries with either the short or long form of the host name or no host name specified in the tuple. -If the NIS domain is set, the query will match only match entries +If the NIS domain is set, the query will only match entries that include the domain or for which there is no domain present. If the NIS domain is \fInot\fR @@ -1796,7 +1796,7 @@ sudo-workers mailing list, https://www.sudo.ws/mailman/listinfo/sudo-workers (public) or (private). .PP -Please not report security vulnerabilities through public GitHub +Please do not report security vulnerabilities through public GitHub issues, Bugzilla or mailing lists. Instead, report them via email to . You may encrypt your message with PGP if you would like, using diff --git a/docs/sudoers.man.in b/docs/sudoers.man.in index 813e7f37e..bfcc4572c 100644 --- a/docs/sudoers.man.in +++ b/docs/sudoers.man.in @@ -8138,7 +8138,7 @@ sudo-workers mailing list, https://www.sudo.ws/mailman/listinfo/sudo-workers (public) or (private). .PP -Please not report security vulnerabilities through public GitHub +Please do not report security vulnerabilities through public GitHub issues, Bugzilla or mailing lists. Instead, report them via email to . You may encrypt your message with PGP if you would like, using diff --git a/docs/sudoers_timestamp.man.in b/docs/sudoers_timestamp.man.in index 577162829..161a12f80 100644 --- a/docs/sudoers_timestamp.man.in +++ b/docs/sudoers_timestamp.man.in @@ -316,7 +316,7 @@ sudo-workers mailing list, https://www.sudo.ws/mailman/listinfo/sudo-workers (public) or (private). .PP -Please not report security vulnerabilities through public GitHub +Please do not report security vulnerabilities through public GitHub issues, Bugzilla or mailing lists. Instead, report them via email to . You may encrypt your message with PGP if you would like, using diff --git a/docs/sudoreplay.man.in b/docs/sudoreplay.man.in index cc3de91c1..63fd68755 100644 --- a/docs/sudoreplay.man.in +++ b/docs/sudoreplay.man.in @@ -526,7 +526,7 @@ sudo-workers mailing list, https://www.sudo.ws/mailman/listinfo/sudo-workers (public) or (private). .PP -Please not report security vulnerabilities through public GitHub +Please do not report security vulnerabilities through public GitHub issues, Bugzilla or mailing lists. Instead, report them via email to . You may encrypt your message with PGP if you would like, using diff --git a/docs/visudo.man.in b/docs/visudo.man.in index af595ccad..c7c571993 100644 --- a/docs/visudo.man.in +++ b/docs/visudo.man.in @@ -539,7 +539,7 @@ sudo-workers mailing list, https://www.sudo.ws/mailman/listinfo/sudo-workers (public) or (private). .PP -Please not report security vulnerabilities through public GitHub +Please do not report security vulnerabilities through public GitHub issues, Bugzilla or mailing lists. Instead, report them via email to . You may encrypt your message with PGP if you would like, using