@@ -234,7 +234,7 @@ The following plugin-agnostic paths may be set in the
234234file:
235235.Bl -tag -width 4n
236236.It askpass
237- The fully qualified path to a helper program used to read the user's
237+ The fully- qualified path to a helper program used to read the user's
238238password when no terminal is available.
239239This may be the case when
240240.Nm sudo
@@ -271,7 +271,7 @@ functions, for example
271271.Bx ,
272272macOS and Solaris.
273273.It intercept
274- The path to a shared library containing a wrappers for the
274+ The path to a shared library containing wrappers for the
275275.Xr execve 2 ,
276276.Xr execl 3 ,
277277.Xr execle 3 ,
@@ -347,7 +347,7 @@ The default value is
347347.Pa @noexec_file@ .
348348.It plugin_dir
349349The default directory to use when searching for plugins
350- that are specified without a fully qualified path name.
350+ that are specified without a fully- qualified path name.
351351The default value is
352352.Pa @plugindir@ .
353353.if \n( SL \{\
@@ -735,8 +735,8 @@ front-end configuration
735735# Path intercept /path/to/sudo_intercept.so
736736#
737737# Path to a shared library containing replacements for the execv()
738- # and execve() library functions that perform a policy check to verify
739- # the command is allowed and simply return an error if not. This is
738+ # and execve() library functions, which perform a policy check to verify
739+ # whether the command is allowed and return an error if it is not. This is
740740# used to implement the "intercept" functionality on systems that
741741# support LD_PRELOAD or its equivalent.
742742#
@@ -764,7 +764,7 @@ front-end configuration
764764# Path plugin_dir /path/to/plugins
765765#
766766# The default directory to use when searching for plugins that are
767- # specified without a fully qualified path name.
767+ # specified without a fully- qualified path name.
768768#
769769#Path plugin_dir @plugindir@
770770
@@ -850,7 +850,7 @@ sudo-workers mailing list,
850850https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
851851852852.Pp
853- Please not report security vulnerabilities through public GitHub
853+ Please do not report security vulnerabilities through public GitHub
854854issues, Bugzilla or mailing lists.
855855Instead, report them via email to <
[email protected] >.
856856You may encrypt your message with PGP if you would like, using
0 commit comments