@@ -255,7 +255,7 @@ The following plugin-agnostic paths may be set in the
255255file:
256256.TP 6n
257257askpass
258- The fully qualified path to a helper program used to read the user's
258+ The fully- qualified path to a helper program used to read the user's
259259password when no terminal is available.
260260This may be the case when
261261\fB sudo \fR
294294macOS and Solaris.
295295.TP 6n
296296intercept
297- The path to a shared library containing a wrappers for the
297+ The path to a shared library containing wrappers for the
298298execve(2),
299299execl(3),
300300execle(3),
@@ -372,7 +372,7 @@ The default value is
372372.TP 6n
373373plugin_dir
374374The default directory to use when searching for plugins
375- that are specified without a fully qualified path name.
375+ that are specified without a fully- qualified path name.
376376The default value is
377377\fI @plugindir@ \fR .
378378.if \n( SL \{\
@@ -803,11 +803,11 @@ front-end configuration
803803# Sudo command interception:
804804# Path intercept /path/to/sudo_intercept.so
805805#
806- # Path to a shared library containing replacements for the execv()
807- # and execve () library functions that perform a policy check to verify
808- # the command is allowed and simply return an error if not. This is
809- # used to implement the "intercept" functionality on systems that
810- # support LD_PRELOAD or its equivalent.
806+ # Path to a shared library containing replacements for the execv(),
807+ # execve() and fexecve () library functions, which perform a policy
808+ # check to verify whether the command is allowed and simply return
809+ # an error if it is not. This is used to implement the "intercept"
810+ # functionality on systems that support LD_PRELOAD or its equivalent.
811811#
812812# The compiled-in value is usually sufficient and should only be changed
813813# if you rename or move the sudo_intercept.so file.
@@ -833,7 +833,7 @@ front-end configuration
833833# Path plugin_dir /path/to/plugins
834834#
835835# The default directory to use when searching for plugins that are
836- # specified without a fully qualified path name.
836+ # specified without a fully- qualified path name.
837837#
838838#Path plugin_dir @plugindir@
839839
@@ -921,7 +921,7 @@ sudo-workers mailing list,
921921https://www.sudo.ws/mailman/listinfo/sudo-workers (public)
922922923923.PP
924- Please not report security vulnerabilities through public GitHub
924+ Please do not report security vulnerabilities through public GitHub
925925issues, Bugzilla or mailing lists.
926926Instead, report them via email to <
[email protected] >.
927927You may encrypt your message with PGP if you would like, using
0 commit comments