From aeffa02a17e43c906c5780583a40d554706617e5 Mon Sep 17 00:00:00 2001 From: "Todd C. Miller" Date: Wed, 17 Feb 1999 16:40:55 +0000 Subject: [PATCH] fix grammar; espie@openbsd.org --- sudo.cat | 12 ++++++------ sudo.html | 2 +- sudo.man | 8 ++++---- sudo.pod | 2 +- 4 files changed, 12 insertions(+), 12 deletions(-) diff --git a/sudo.cat b/sudo.cat index 2eee11668..7f0584266 100644 --- a/sudo.cat +++ b/sudo.cat @@ -61,7 +61,7 @@ OOOOPPPPTTTTIIIIOOOONNNNSSSS -6/Feb/99 1.5.8 1 +17/Feb/99 1.5.8 1 @@ -127,7 +127,7 @@ SSSSEEEECCCCUUUURRRRIIIITTTTYYYY NNNNOOOOTTTTE -6/Feb/99 1.5.8 2 +17/Feb/99 1.5.8 2 @@ -193,7 +193,7 @@ EEEENNNNVVVVIIIIRRRROOOONNNNMMMMEEEENNNNTTTT V -6/Feb/99 1.5.8 3 +17/Feb/99 1.5.8 3 @@ -231,7 +231,7 @@ DDDDIIIISSSSCCCCLLLLAAAAIIIIMMMMEEEERRRR CCCCAAAAVVVVEEEEAAAATTTTSSSS There is no easy way to prevent a user from gaining a root - shell if that user has access to commands allow shell + shell if that user has access to commands allowing shell escapes. If users have sudo ALL there is nothing to prevent them @@ -259,7 +259,7 @@ SSSSEEEEEEEE AAAALLLLSSSSOOOO -6/Feb/99 1.5.8 4 +17/Feb/99 1.5.8 4 @@ -325,6 +325,6 @@ sudo(8) MAINTENANCE COMMANDS sudo(8) -6/Feb/99 1.5.8 5 +17/Feb/99 1.5.8 5 diff --git a/sudo.html b/sudo.html index 218c3c372..cc19b2b18 100644 --- a/sudo.html +++ b/sudo.html @@ -358,7 +358,7 @@ Mass Ave, Cambridge, MA 02139, USA. There is no easy way to prevent a user from gaining a root shell if that -user has access to commands allow shell escapes. +user has access to commands allowing shell escapes.

diff --git a/sudo.man b/sudo.man index 26311dfd7..5be2da9ab 100644 --- a/sudo.man +++ b/sudo.man @@ -2,8 +2,8 @@ ''' $RCSfile$$Revision$$Date$ ''' ''' $Log$ -''' Revision 1.29 1999/02/07 00:47:32 millert -''' Make it clear that it is the user's password, not root's, that we want. +''' Revision 1.30 1999/02/17 16:40:55 millert +''' fix grammar; espie@openbsd.org ''' ''' .de Sh @@ -96,7 +96,7 @@ .nr % 0 .rr F .\} -.TH sudo 8 "1.5.8" "6/Feb/99" "MAINTENANCE COMMANDS" +.TH sudo 8 "1.5.8" "17/Feb/99" "MAINTENANCE COMMANDS" .UC .if n .hy 0 .if n .na @@ -363,7 +363,7 @@ with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. .SH "CAVEATS" There is no easy way to prevent a user from gaining a root shell if -that user has access to commands allow shell escapes. +that user has access to commands allowing shell escapes. .PP If users have sudo ALL there is nothing to prevent them from creating their own program that gives them a root shell regardless of any \*(L'!\*(R' diff --git a/sudo.pod b/sudo.pod index 0ff61f7ce..2a079de38 100644 --- a/sudo.pod +++ b/sudo.pod @@ -217,7 +217,7 @@ with this program; if not, write to the Free Software Foundation, Inc., =head1 CAVEATS There is no easy way to prevent a user from gaining a root shell if -that user has access to commands allow shell escapes. +that user has access to commands allowing shell escapes. If users have sudo ALL there is nothing to prevent them from creating their own program that gives them a root shell regardless of any '!' -- 2.40.0