2
0
mirror of https://github.com/sudo-project/sudo.git synced 2025-08-22 01:49:11 +00:00

Fix problems found by igor. Bug #854

This commit is contained in:
Todd C. Miller 2018-10-06 06:00:56 -06:00
parent a814da673f
commit dd6a6e4013
18 changed files with 101 additions and 101 deletions

View File

@ -162,7 +162,7 @@ DDEESSCCRRIIPPTTIIOONN
Run the command with the primary group set to _g_r_o_u_p instead
of the primary group specified by the target user's password
database entry. The _g_r_o_u_p may be either a group name or a
numeric group ID (GID) prefixed with the `#' character (e.g.
numeric group ID (GID) prefixed with the `#' character (e.g.,
#0 for GID 0). When running a command as a GID, many shells
require that the `#' be escaped with a backslash (`\'). If
no --uu option is specified, the command will be run as the
@ -318,7 +318,7 @@ DDEESSCCRRIIPPTTIIOONN
--uu _u_s_e_r, ----uusseerr=_u_s_e_r
Run the command as a user other than the default target user
(usually _r_o_o_t). The _u_s_e_r may be either a user name or a
numeric user ID (UID) prefixed with the `#' character (e.g.
numeric user ID (UID) prefixed with the `#' character (e.g.,
#0 for UID 0). When running commands as a UID, many shells
require that the `#' be escaped with a backslash (`\'). Some
security policies may restrict UIDs to those listed in the
@ -344,7 +344,7 @@ DDEESSCCRRIIPPTTIIOONN
command line arguments.
Environment variables to be set for the command may also be passed on the
command line in the form of _V_A_R=_v_a_l_u_e, e.g.
command line in the form of _V_A_R=_v_a_l_u_e, e.g.,
LD_LIBRARY_PATH=_/_u_s_r_/_l_o_c_a_l_/_p_k_g_/_l_i_b. Variables passed on the command line
are subject to restrictions imposed by the security policy plugin. The
_s_u_d_o_e_r_s policy subjects variables passed on the command line to the same
@ -659,4 +659,4 @@ DDIISSCCLLAAIIMMEERR
file distributed with ssuuddoo or https://www.sudo.ws/license.html for
complete details.
Sudo 1.8.25 March 21, 2018 Sudo 1.8.25
Sudo 1.8.26 October 6, 2018 Sudo 1.8.26

View File

@ -20,7 +20,7 @@
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
.\"
.TH "SUDO" "8" "March 21, 2018" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
.TH "SUDO" "8" "October 6, 2018" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
.nh
.if n .ad l
.SH "NAME"
@ -346,7 +346,7 @@ may be either a group name or a numeric group ID
(GID)
prefixed with the
\(oq#\(cq
character (e.g.
character (e.g.,
\fR#0\fR
for GID 0).
When running a command as a GID, many shells require that the
@ -603,7 +603,7 @@ may be either a user name or a numeric user ID
(UID)
prefixed with the
\(oq#\(cq
character (e.g.
character (e.g.,
\fR#0\fR
for UID 0).
When running commands as a UID, many shells require that the
@ -653,7 +653,7 @@ should stop processing command line arguments.
Environment variables to be set for the command may also be passed
on the command line in the form of
\fIVAR\fR=\fIvalue\fR,
e.g.\&
e.g.,
\fRLD_LIBRARY_PATH\fR=\fI/usr/local/pkg/lib\fR.
Variables passed on the command line are subject to restrictions
imposed by the security policy plugin.

View File

@ -19,7 +19,7 @@
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
.\"
.Dd March 21, 2018
.Dd October 6, 2018
.Dt SUDO @mansectsu@
.Os Sudo @PACKAGE_VERSION@
.Sh NAME
@ -313,7 +313,7 @@ may be either a group name or a numeric group ID
.Pq GID
prefixed with the
.Ql #
character (e.g.
character (e.g.,
.Li #0
for GID 0).
When running a command as a GID, many shells require that the
@ -544,7 +544,7 @@ may be either a user name or a numeric user ID
.Pq UID
prefixed with the
.Ql #
character (e.g.
character (e.g.,
.Li #0
for UID 0).
When running commands as a UID, many shells require that the
@ -592,7 +592,7 @@ should stop processing command line arguments.
Environment variables to be set for the command may also be passed
on the command line in the form of
.Ar VAR Ns = Ns Ar value ,
e.g.\&
e.g.,
.Ev LD_LIBRARY_PATH Ns = Ns Pa /usr/local/pkg/lib .
Variables passed on the command line are subject to restrictions
imposed by the security policy plugin.

View File

@ -164,7 +164,7 @@ DDEESSCCRRIIPPTTIIOONN
network_addrs=list
A space-separated list of IP network addresses and
netmasks in the form "addr/netmask", e.g.
netmasks in the form "addr/netmask", e.g.,
"192.168.1.2/255.255.255.0". The address and netmask
pairs may be either IPv4 or IPv6, depending on what the
operating system supports. If the address contains a
@ -241,12 +241,12 @@ DDEESSCCRRIIPPTTIIOONN
user's home directory.
sudoedit=bool
Set to true when the --ee flag is is specified or if
invoked as ssuuddooeeddiitt. The plugin shall substitute an
editor into _a_r_g_v in the cchheecckk__ppoolliiccyy() function or
return -2 with a usage error if the plugin does not
support _s_u_d_o_e_d_i_t. For more information, see the
_c_h_e_c_k___p_o_l_i_c_y section.
Set to true when the --ee flag is specified or if invoked
as ssuuddooeeddiitt. The plugin shall substitute an editor
into _a_r_g_v in the cchheecckk__ppoolliiccyy() function or return -2
with a usage error if the plugin does not support
_s_u_d_o_e_d_i_t. For more information, see the _c_h_e_c_k___p_o_l_i_c_y
section.
timeout=string
User-specified command timeout. Not all plugins
@ -1648,4 +1648,4 @@ DDIISSCCLLAAIIMMEERR
file distributed with ssuuddoo or https://www.sudo.ws/license.html for
complete details.
Sudo 1.8.25 June 1, 2018 Sudo 1.8.25
Sudo 1.8.26 October 6, 2018 Sudo 1.8.26

View File

@ -15,7 +15,7 @@
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.TH "SUDO_PLUGIN" "5" "June 1, 2018" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
.TH "SUDO_PLUGIN" "5" "October 6, 2018" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
.nh
.if n .ad l
.SH "NAME"
@ -290,7 +290,7 @@ network_addrs=list
A space-separated list of IP network addresses and netmasks in the
form
\(lqaddr/netmask\(rq,
e.g.\&
e.g.,
\(lq192.168.1.2/255.255.255.0\(rq.
The address and netmask pairs may be either IPv4 or IPv6, depending on
what the operating system supports.
@ -399,7 +399,7 @@ environment variable to the target user's home directory.
sudoedit=bool
Set to true when the
\fB\-e\fR
flag is is specified or if invoked as
flag is specified or if invoked as
\fBsudoedit\fR.
The plugin shall substitute an editor into
\fIargv\fR

View File

@ -14,7 +14,7 @@
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.Dd June 1, 2018
.Dd October 6, 2018
.Dt SUDO_PLUGIN @mansectform@
.Os Sudo @PACKAGE_VERSION@
.Sh NAME
@ -265,7 +265,7 @@ This will only be present if there is a corresponding setting in
A space-separated list of IP network addresses and netmasks in the
form
.Dq addr/netmask ,
e.g.\&
e.g.,
.Dq 192.168.1.2/255.255.255.0 .
The address and netmask pairs may be either IPv4 or IPv6, depending on
what the operating system supports.
@ -359,7 +359,7 @@ environment variable to the target user's home directory.
.It sudoedit=bool
Set to true when the
.Fl e
flag is is specified or if invoked as
flag is specified or if invoked as
.Nm sudoedit .
The plugin shall substitute an editor into
.Em argv

View File

@ -11,7 +11,7 @@ DDEESSCCRRIIPPTTIIOONN
policy information in LDAP, please see sudoers.ldap(4).
CCoonnffiigguurriinngg ssuuddoo..ccoonnff ffoorr ssuuddooeerrss
ssuuddoo consults the sudo.conf(4) file to determine which policy and and I/O
ssuuddoo consults the sudo.conf(4) file to determine which policy and I/O
logging plugins to load. If no sudo.conf(4) file is present, or if it
contains no Plugin lines, ssuuddooeerrss will be used for policy decisions and
I/O logging. To explicitly configure sudo.conf(4) to use the ssuuddooeerrss
@ -22,7 +22,7 @@ DDEESSCCRRIIPPTTIIOONN
Starting with ssuuddoo 1.8.5, it is possible to specify optional arguments to
the ssuuddooeerrss plugin in the sudo.conf(4) file. These arguments, if
present, should be listed after the path to the plugin (i.e. after
present, should be listed after the path to the plugin (i.e., after
_s_u_d_o_e_r_s_._s_o). Multiple arguments may be specified, separated by white
space. For example:
@ -309,7 +309,7 @@ SSUUDDOOEERRSS FFIILLEE FFOORRMMAATT
A user name, uid, group, gid, netgroup, nonunix_group or nonunix_gid may
be enclosed in double quotes to avoid the need for escaping special
characters. Alternately, special characters may be specified in escaped
hex mode, e.g. \x20 for space. When using double quotes, any prefix
hex mode, e.g., \x20 for space. When using double quotes, any prefix
characters must be included inside the quotes.
The actual nonunix_group and nonunix_gid syntax depends on the underlying
@ -345,7 +345,7 @@ SSUUDDOOEERRSS FFIILLEE FFOORRMMAATT
User_Aliases it can contain Runas_Aliases. Note that user names and
groups are matched as strings. In other words, two users (groups) with
the same uid (gid) are considered to be distinct. If you wish to match
all user names with the same uid (e.g. root and toor), you can use a uid
all user names with the same uid (e.g., root and toor), you can use a uid
instead (#0 in the example given).
Host_List ::= Host |
@ -366,8 +366,8 @@ SSUUDDOOEERRSS FFIILLEE FFOORRMMAATT
host's network interfaces and, if the network number corresponds to one
of the hosts's network interfaces, will use the netmask of that
interface. The netmask may be specified either in standard IP address
notation (e.g. 255.255.255.0 or ffff:ffff:ffff:ffff::), or CIDR notation
(number of bits, e.g. 24 or 64). A host name may include shell-style
notation (e.g., 255.255.255.0 or ffff:ffff:ffff:ffff::), or CIDR notation
(number of bits, e.g., 24 or 64). A host name may include shell-style
wildcards (see the _W_i_l_d_c_a_r_d_s section below), but unless the host name
command on your machine returns the fully qualified host name, you'll
need to use the _f_q_d_n option for wildcards to be useful. Note that ssuuddoo
@ -931,7 +931,7 @@ SSUUDDOOEERRSS FFIILLEE FFOORRMMAATT
characters in a _U_s_e_r _S_p_e_c_i_f_i_c_a_t_i_o_n (`=', `:', `(', `)') is optional.
The following characters must be escaped with a backslash (`\') when used
as part of a word (e.g. a user name or host name): `!', `=', `:', `,',
as part of a word (e.g., a user name or host name): `!', `=', `:', `,',
`(', `)', `\'.
SSUUDDOOEERRSS OOPPTTIIOONNSS
@ -1504,10 +1504,10 @@ SSUUDDOOEERRSS OOPPTTIIOONNSS
terminal, _u_s_e___p_t_y has no effect.
A malicious program run under ssuuddoo may be capable of
injecting injecting commands into the user's terminal
or running a background process that retains access to
the user's terminal device even after the main program
has finished executing. By running the command in a
injecting commands into the user's terminal or running
a background process that retains access to the user's
terminal device even after the main program has
finished executing. By running the command in a
separate pseudo-pty, this attack is no longer possible.
This flag is _o_f_f by default.
@ -1665,7 +1665,7 @@ SSUUDDOOEERRSS OOPPTTIIOONNSS
%{seq}
expanded to a monotonically increasing base-36
sequence number, such as 0100A5, where every two
digits are used to form a new directory, e.g.
digits are used to form a new directory, e.g.,
_0_1_/_0_0_/_A_5
%{user}
@ -1677,11 +1677,11 @@ SSUUDDOOEERRSS OOPPTTIIOONNSS
%{runas_user}
expanded to the login name of the user the
command will be run as (e.g. root)
command will be run as (e.g., root)
%{runas_group}
expanded to the group name of the user the
command will be run as (e.g. wheel)
command will be run as (e.g., wheel)
%{hostname}
expanded to the local host name without the
@ -1743,9 +1743,9 @@ SSUUDDOOEERRSS OOPPTTIIOONNSS
file permissions will always include the owner read and
write bits, even if they are not present in the
specified mode. When creating I/O log directories,
search (execute) bits are added to to match the read
and write bits specified by _i_o_l_o_g___m_o_d_e. Defaults to
0600 (read and write by user only).
search (execute) bits are added to match the read and
write bits specified by _i_o_l_o_g___m_o_d_e. Defaults to 0600
(read and write by user only).
This setting is only supported by version 1.8.19 or
higher.
@ -2232,8 +2232,8 @@ LLOOGG FFOORRMMAATT
username The login name of the user who ran ssuuddoo.
ttyname The short name of the terminal (e.g. "console", "tty01", or
"pts/0") ssuuddoo was run on, or "unknown" if there was no
ttyname The short name of the terminal (e.g., "console", "tty01",
or "pts/0") ssuuddoo was run on, or "unknown" if there was no
terminal present.
cwd The current working directory that ssuuddoo was run in.
@ -2927,4 +2927,4 @@ DDIISSCCLLAAIIMMEERR
file distributed with ssuuddoo or https://www.sudo.ws/license.html for
complete details.
Sudo 1.8.26 September 24, 2018 Sudo 1.8.26
Sudo 1.8.26 October 6, 2018 Sudo 1.8.26

View File

@ -20,7 +20,7 @@
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
.\"
.TH "SUDOERS" "5" "September 24, 2018" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
.TH "SUDOERS" "5" "October 6, 2018" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
.nh
.if n .ad l
.SH "NAME"
@ -51,7 +51,7 @@ sudoers.ldap(@mansectform@).
\fBsudo\fR
consults the
sudo.conf(@mansectform@)
file to determine which policy and and I/O logging plugins to load.
file to determine which policy and I/O logging plugins to load.
If no
sudo.conf(@mansectform@)
file is present, or if it contains no
@ -80,7 +80,7 @@ plugin in the
sudo.conf(@mansectform@)
file.
These arguments, if present, should be listed after the path to the plugin
(i.e.\& after
(i.e., after
\fIsudoers.so\fR).
Multiple arguments may be specified, separated by white space.
For example:
@ -707,7 +707,7 @@ or
may be enclosed in double quotes to avoid the
need for escaping special characters.
Alternately, special characters
may be specified in escaped hex mode, e.g.\& \ex20 for space.
may be specified in escaped hex mode, e.g., \ex20 for space.
When
using double quotes, any prefix characters must be included inside
the quotes.
@ -771,7 +771,7 @@ Note that
user names and groups are matched as strings.
In other words, two
users (groups) with the same uid (gid) are considered to be distinct.
If you wish to match all user names with the same uid (e.g.\&
If you wish to match all user names with the same uid (e.g.,
root and toor), you can use a uid instead (#0 in the example given).
.nf
.sp
@ -804,8 +804,8 @@ will query each of the local host's network interfaces and,
if the network number corresponds to one of the hosts's network
interfaces, will use the netmask of that interface.
The netmask may be specified either in standard IP address notation
(e.g.\& 255.255.255.0 or ffff:ffff:ffff:ffff::),
or CIDR notation (number of bits, e.g.\& 24 or 64).
(e.g., 255.255.255.0 or ffff:ffff:ffff:ffff::),
or CIDR notation (number of bits, e.g., 24 or 64).
A host name may include shell-style wildcards (see the
\fIWildcards\fR
section below),
@ -1994,7 +1994,7 @@ is optional.
.PP
The following characters must be escaped with a backslash
(\(oq\e\(cq)
when used as part of a word (e.g.\& a user name or host name):
when used as part of a word (e.g., a user name or host name):
\(oq\&!\(cq,
\(oq=\&\(cq,
\(oq:\&\(cq,
@ -3129,7 +3129,7 @@ has no effect.
.sp
A malicious program run under
\fBsudo\fR
may be capable of injecting injecting commands into the user's
may be capable of injecting commands into the user's
terminal or running a background process that retains access to the
user's terminal device even after the main program has finished
executing.
@ -3407,7 +3407,7 @@ escape sequences are supported:
.TP 6n
\fR%{seq}\fR
expanded to a monotonically increasing base-36 sequence number, such as 0100A5,
where every two digits are used to form a new directory, e.g.\&
where every two digits are used to form a new directory, e.g.,
\fI01/00/A5\fR
.PD
.TP 6n
@ -3419,11 +3419,11 @@ expanded to the name of the invoking user's real group ID
.TP 6n
\fR%{runas_user}\fR
expanded to the login name of the user the command will
be run as (e.g.\& root)
be run as (e.g., root)
.TP 6n
\fR%{runas_group}\fR
expanded to the group name of the user the command will
be run as (e.g.\& wheel)
be run as (e.g., wheel)
.TP 6n
\fR%{hostname}\fR
expanded to the local host name without the domain name
@ -3523,7 +3523,7 @@ are honored, everything else is ignored.
The file permissions will always include the owner read and
write bits, even if they are not present in the specified mode.
When creating I/O log directories, search (execute) bits are added
to to match the read and write bits specified by
to match the read and write bits specified by
\fIiolog_mode\fR.
Defaults to 0600 (read and write by user only).
.sp
@ -4418,7 +4418,7 @@ The login name of the user who ran
\fBsudo\fR.
.TP 14n
ttyname
The short name of the terminal (e.g.\&
The short name of the terminal (e.g.,
\(lqconsole\(rq,
\(lqtty01\(rq,
or

View File

@ -19,7 +19,7 @@
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
.\"
.Dd September 24, 2018
.Dd October 6, 2018
.Dt SUDOERS @mansectform@
.Os Sudo @PACKAGE_VERSION@
.Sh NAME
@ -50,7 +50,7 @@ in LDAP, please see
.Nm sudo
consults the
.Xr sudo.conf @mansectform@
file to determine which policy and and I/O logging plugins to load.
file to determine which policy and I/O logging plugins to load.
If no
.Xr sudo.conf @mansectform@
file is present, or if it contains no
@ -76,7 +76,7 @@ plugin in the
.Xr sudo.conf @mansectform@
file.
These arguments, if present, should be listed after the path to the plugin
(i.e.\& after
(i.e., after
.Pa sudoers.so ) .
Multiple arguments may be specified, separated by white space.
For example:
@ -681,7 +681,7 @@ or
may be enclosed in double quotes to avoid the
need for escaping special characters.
Alternately, special characters
may be specified in escaped hex mode, e.g.\& \ex20 for space.
may be specified in escaped hex mode, e.g., \ex20 for space.
When
using double quotes, any prefix characters must be included inside
the quotes.
@ -741,7 +741,7 @@ Note that
user names and groups are matched as strings.
In other words, two
users (groups) with the same uid (gid) are considered to be distinct.
If you wish to match all user names with the same uid (e.g.\&
If you wish to match all user names with the same uid (e.g.,
root and toor), you can use a uid instead (#0 in the example given).
.Bd -literal
Host_List ::= Host |
@ -771,8 +771,8 @@ will query each of the local host's network interfaces and,
if the network number corresponds to one of the hosts's network
interfaces, will use the netmask of that interface.
The netmask may be specified either in standard IP address notation
(e.g.\& 255.255.255.0 or ffff:ffff:ffff:ffff::),
or CIDR notation (number of bits, e.g.\& 24 or 64).
(e.g., 255.255.255.0 or ffff:ffff:ffff:ffff::),
or CIDR notation (number of bits, e.g., 24 or 64).
A host name may include shell-style wildcards (see the
.Sx Wildcards
section below),
@ -1867,7 +1867,7 @@ is optional.
.Pp
The following characters must be escaped with a backslash
.Pq Ql \e
when used as part of a word (e.g.\& a user name or host name):
when used as part of a word (e.g., a user name or host name):
.Ql \&! ,
.Ql =\& ,
.Ql :\& ,
@ -2942,7 +2942,7 @@ has no effect.
.Pp
A malicious program run under
.Nm sudo
may be capable of injecting injecting commands into the user's
may be capable of injecting commands into the user's
terminal or running a background process that retains access to the
user's terminal device even after the main program has finished
executing.
@ -3206,7 +3206,7 @@ escape sequences are supported:
.Bl -tag -width 4n
.It Li %{seq}
expanded to a monotonically increasing base-36 sequence number, such as 0100A5,
where every two digits are used to form a new directory, e.g.\&
where every two digits are used to form a new directory, e.g.,
.Pa 01/00/A5
.It Li %{user}
expanded to the invoking user's login name
@ -3214,10 +3214,10 @@ expanded to the invoking user's login name
expanded to the name of the invoking user's real group ID
.It Li %{runas_user}
expanded to the login name of the user the command will
be run as (e.g.\& root)
be run as (e.g., root)
.It Li %{runas_group}
expanded to the group name of the user the command will
be run as (e.g.\& wheel)
be run as (e.g., wheel)
.It Li %{hostname}
expanded to the local host name without the domain name
.It Li %{command}
@ -3311,7 +3311,7 @@ are honored, everything else is ignored.
The file permissions will always include the owner read and
write bits, even if they are not present in the specified mode.
When creating I/O log directories, search (execute) bits are added
to to match the read and write bits specified by
to match the read and write bits specified by
.Em iolog_mode .
Defaults to 0600 (read and write by user only).
.Pp
@ -4112,7 +4112,7 @@ This field is only present when logging via
The login name of the user who ran
.Nm sudo .
.It ttyname
The short name of the terminal (e.g.\&
The short name of the terminal (e.g.,
.Dq console ,
.Dq tty01 ,
or

View File

@ -115,8 +115,8 @@ LLOOCCKKIINNGG
Records of type TS_GLOBAL cannot be locked for a long period of time
since doing so would interfere with other ssuuddoo processes. Instead, a
separate lock record is used to prevent multiple ssuuddoo processes using the
same terminal (or parent process ID) from from prompting for a password
as the same time.
same terminal (or parent process ID) from prompting for a password as the
same time.
SSEEEE AALLSSOO
sudoers(4), sudo(1m)
@ -198,4 +198,4 @@ DDIISSCCLLAAIIMMEERR
file distributed with ssuuddoo or https://www.sudo.ws/license.html for
complete details.
Sudo 1.8.25 December 21, 2017 Sudo 1.8.25
Sudo 1.8.26 October 6, 2018 Sudo 1.8.26

View File

@ -1,6 +1,6 @@
.\" Automatically generated from an mdoc input file. Do not edit.
.\"
.\" Copyright (c) 2017 Todd C. Miller <Todd.Miller@sudo.ws>
.\" Copyright (c) 2017-2018 Todd C. Miller <Todd.Miller@sudo.ws>
.\"
.\" Permission to use, copy, modify, and distribute this software for any
.\" purpose with or without fee is hereby granted, provided that the above
@ -15,7 +15,7 @@
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.TH "SUDOERS_TIMESTAMP" "5" "December 21, 2017" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
.TH "SUDOERS_TIMESTAMP" "5" "October 6, 2018" "Sudo @PACKAGE_VERSION@" "File Formats Manual"
.nh
.if n .ad l
.SH "NAME"
@ -211,7 +211,7 @@ processes.
Instead, a separate lock record is used to prevent multiple
\fBsudo\fR
processes using the same terminal (or parent process ID) from
from prompting for a password as the same time.
prompting for a password as the same time.
.SH "SEE ALSO"
sudoers(@mansectform@),
sudo(@mansectsu@)

View File

@ -1,5 +1,5 @@
.\"
.\" Copyright (c) 2017 Todd C. Miller <Todd.Miller@sudo.ws>
.\" Copyright (c) 2017-2018 Todd C. Miller <Todd.Miller@sudo.ws>
.\"
.\" Permission to use, copy, modify, and distribute this software for any
.\" purpose with or without fee is hereby granted, provided that the above
@ -14,7 +14,7 @@
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.Dd December 21, 2017
.Dd October 6, 2018
.Dt SUDOERS_TIMESTAMP @mansectform@
.Os Sudo @PACKAGE_VERSION@
.Sh NAME
@ -199,7 +199,7 @@ processes.
Instead, a separate lock record is used to prevent multiple
.Nm sudo
processes using the same terminal (or parent process ID) from
from prompting for a password as the same time.
prompting for a password as the same time.
.Sh SEE ALSO
.Xr sudoers @mansectform@ ,
.Xr sudo @mansectsu@

View File

@ -15,7 +15,7 @@ DDEESSCCRRIIPPTTIIOONN
line options.
The _I_D should either be a six character sequence of digits and upper case
letters, e.g. 0100A5, or a pattern matching the _i_o_l_o_g___f_i_l_e option in the
letters, e.g., 0100A5, or a pattern matching the _i_o_l_o_g___f_i_l_e option in the
_s_u_d_o_e_r_s file. When a command is run via ssuuddoo with _l_o_g___o_u_t_p_u_t enabled in
the _s_u_d_o_e_r_s file, a TSID=ID string is logged via syslog or to the ssuuddoo
log file. The _I_D may also be determined using ssuuddoorreeppllaayy's list mode.
@ -97,7 +97,7 @@ DDEESSCCRRIIPPTTIIOONN
tty _t_t_y _n_a_m_e
Evaluates to true if the command was run on the
specified terminal device. The _t_t_y _n_a_m_e should be
specified without the _/_d_e_v_/ prefix, e.g. _t_t_y_0_1
specified without the _/_d_e_v_/ prefix, e.g., _t_t_y_0_1
instead of _/_d_e_v_/_t_t_y_0_1.
user _u_s_e_r _n_a_m_e
@ -120,7 +120,7 @@ DDEESSCCRRIIPPTTIIOONN
session includes long pauses. When the --mm option is
specified, ssuuddoorreeppllaayy will limit these pauses to at most
_m_a_x___w_a_i_t seconds. The value may be specified as a floating
point number, e.g. _2_._5. A _m_a_x___w_a_i_t of zero or less will
point number, e.g., _2_._5. A _m_a_x___w_a_i_t of zero or less will
eliminate the pauses entirely.
--nn, ----nnoonn--iinntteerraaccttiivvee
@ -300,4 +300,4 @@ DDIISSCCLLAAIIMMEERR
file distributed with ssuuddoo or https://www.sudo.ws/license.html for
complete details.
Sudo 1.8.26 October 5, 2018 Sudo 1.8.26
Sudo 1.8.26 October 6, 2018 Sudo 1.8.26

View File

@ -15,7 +15,7 @@
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.TH "SUDOREPLAY" "8" "October 5, 2018" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
.TH "SUDOREPLAY" "8" "October 6, 2018" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
.nh
.if n .ad l
.SH "NAME"
@ -48,7 +48,7 @@ adjusted (faster or slower) based on the command line options.
The
\fIID\fR
should either be a six character sequence of digits and
upper case letters, e.g.\&
upper case letters, e.g.,
\fR0100A5\fR,
or a pattern matching the
\fIiolog_file\fR
@ -195,7 +195,7 @@ The
\fItty name\fR
should be specified without the
\fI/dev/\fR
prefix, e.g.\&
prefix, e.g.,
\fItty01\fR
instead of
\fI/dev/tty01\fR.
@ -237,7 +237,7 @@ option is specified,
will limit these pauses to at most
\fImax_wait\fR
seconds.
The value may be specified as a floating point number, e.g.\&
The value may be specified as a floating point number, e.g.,
\fI2.5\fR.
A
\fImax_wait\fR

View File

@ -14,7 +14,7 @@
.\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
.Dd October 5, 2018
.Dd October 6, 2018
.Dt SUDOREPLAY @mansectsu@
.Os Sudo @PACKAGE_VERSION@
.Sh NAME
@ -46,7 +46,7 @@ adjusted (faster or slower) based on the command line options.
The
.Em ID
should either be a six character sequence of digits and
upper case letters, e.g.\&
upper case letters, e.g.,
.Li 0100A5 ,
or a pattern matching the
.Em iolog_file
@ -178,7 +178,7 @@ The
.Ar tty name
should be specified without the
.Pa /dev/
prefix, e.g.\&
prefix, e.g.,
.Pa tty01
instead of
.Pa /dev/tty01 .
@ -218,7 +218,7 @@ option is specified,
will limit these pauses to at most
.Em max_wait
seconds.
The value may be specified as a floating point number, e.g.\&
The value may be specified as a floating point number, e.g.,
.Em 2.5 .
A
.Em max_wait

View File

@ -102,7 +102,7 @@ DDEESSCCRRIIPPTTIIOONN
Starting with ssuuddoo 1.8.12, vviissuuddoo will also parse the arguments to the
_s_u_d_o_e_r_s plugin to override the default _s_u_d_o_e_r_s path name, UID, GID and
file mode. These arguments, if present, should be listed after the path
to the plugin (i.e. after _s_u_d_o_e_r_s_._s_o). Multiple arguments may be
to the plugin (i.e., after _s_u_d_o_e_r_s_._s_o). Multiple arguments may be
specified, separated by white space. For example:
Plugin sudoers_policy sudoers.so sudoers_mode=0400
@ -222,4 +222,4 @@ DDIISSCCLLAAIIMMEERR
file distributed with ssuuddoo or https://www.sudo.ws/license.html for
complete details.
Sudo 1.8.25 January 26, 2018 Sudo 1.8.25
Sudo 1.8.26 October 6, 2018 Sudo 1.8.26

View File

@ -20,7 +20,7 @@
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
.\"
.TH "VISUDO" "8" "January 26, 2018" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
.TH "VISUDO" "8" "October 6, 2018" "Sudo @PACKAGE_VERSION@" "System Manager's Manual"
.nh
.if n .ad l
.SH "NAME"
@ -273,7 +273,7 @@ plugin to override the default
\fIsudoers\fR
path name, UID, GID and file mode.
These arguments, if present, should be listed after the path to the plugin
(i.e.\& after
(i.e., after
\fIsudoers.so\fR).
Multiple arguments may be specified, separated by white space.
For example:

View File

@ -19,7 +19,7 @@
.\" Agency (DARPA) and Air Force Research Laboratory, Air Force
.\" Materiel Command, USAF, under agreement number F39502-99-1-0512.
.\"
.Dd January 26, 2018
.Dd October 6, 2018
.Dt VISUDO @mansectsu@
.Os Sudo @PACKAGE_VERSION@
.Sh NAME
@ -267,7 +267,7 @@ plugin to override the default
.Em sudoers
path name, UID, GID and file mode.
These arguments, if present, should be listed after the path to the plugin
(i.e.\& after
(i.e., after
.Pa sudoers.so ) .
Multiple arguments may be specified, separated by white space.
For example: