summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--sudo.cat12
-rw-r--r--sudo.html2
-rw-r--r--sudo.man8
-rw-r--r--sudo.pod2
4 files changed, 12 insertions, 12 deletions
diff --git a/sudo.cat b/sudo.cat
index 2eee11668..7f0584266 100644
--- a/sudo.cat
+++ b/sudo.cat
@@ -61,7 +61,7 @@ OOOOPPPPTTTTIIIIOOOONNNNSSSS
-6/Feb/99 1.5.8 1
+17/Feb/99 1.5.8 1
@@ -127,7 +127,7 @@ SSSSEEEECCCCUUUURRRRIIIITTTTYYYY NNNNOOOOTTTTE
-6/Feb/99 1.5.8 2
+17/Feb/99 1.5.8 2
@@ -193,7 +193,7 @@ EEEENNNNVVVVIIIIRRRROOOONNNNMMMMEEEENNNNTTTT V
-6/Feb/99 1.5.8 3
+17/Feb/99 1.5.8 3
@@ -231,7 +231,7 @@ DDDDIIIISSSSCCCCLLLLAAAAIIIIMMMMEEEERRRR
CCCCAAAAVVVVEEEEAAAATTTTSSSS
There is no easy way to prevent a user from gaining a root
- shell if that user has access to commands allow shell
+ shell if that user has access to commands allowing shell
escapes.
If users have sudo ALL there is nothing to prevent them
@@ -259,7 +259,7 @@ SSSSEEEEEEEE AAAALLLLSSSSOOOO
-6/Feb/99 1.5.8 4
+17/Feb/99 1.5.8 4
@@ -325,6 +325,6 @@ sudo(8) MAINTENANCE COMMANDS sudo(8)
-6/Feb/99 1.5.8 5
+17/Feb/99 1.5.8 5
diff --git a/sudo.html b/sudo.html
index 218c3c372..cc19b2b18 100644
--- a/sudo.html
+++ b/sudo.html
@@ -358,7 +358,7 @@ Mass Ave, Cambridge, MA 02139, USA.
</A></H1>
There is no easy way to prevent a user from gaining a root shell if that
-user has access to commands allow shell escapes.
+user has access to commands allowing shell escapes.
<P>
diff --git a/sudo.man b/sudo.man
index 26311dfd7..5be2da9ab 100644
--- a/sudo.man
+++ b/sudo.man
@@ -2,8 +2,8 @@
''' $RCSfile$$Revision$$Date$
'''
''' $Log$
-''' Revision 1.29 1999/02/07 00:47:32 millert
-''' Make it clear that it is the user's password, not root's, that we want.
+''' Revision 1.30 1999/02/17 16:40:55 millert
+''' fix grammar; espie@openbsd.org
'''
'''
.de Sh
@@ -96,7 +96,7 @@
.nr % 0
.rr F
.\}
-.TH sudo 8 "1.5.8" "6/Feb/99" "MAINTENANCE COMMANDS"
+.TH sudo 8 "1.5.8" "17/Feb/99" "MAINTENANCE COMMANDS"
.UC
.if n .hy 0
.if n .na
@@ -363,7 +363,7 @@ with this program; if not, write to the Free Software Foundation, Inc.,
675 Mass Ave, Cambridge, MA 02139, USA.
.SH "CAVEATS"
There is no easy way to prevent a user from gaining a root shell if
-that user has access to commands allow shell escapes.
+that user has access to commands allowing shell escapes.
.PP
If users have sudo ALL there is nothing to prevent them from creating
their own program that gives them a root shell regardless of any \*(L'!\*(R'
diff --git a/sudo.pod b/sudo.pod
index 0ff61f7ce..2a079de38 100644
--- a/sudo.pod
+++ b/sudo.pod
@@ -217,7 +217,7 @@ with this program; if not, write to the Free Software Foundation, Inc.,
=head1 CAVEATS
There is no easy way to prevent a user from gaining a root shell if
-that user has access to commands allow shell escapes.
+that user has access to commands allowing shell escapes.
If users have sudo ALL there is nothing to prevent them from creating
their own program that gives them a root shell regardless of any '!'