summaryrefslogtreecommitdiff
path: root/security/audit-packages
diff options
context:
space:
mode:
authorwiz <wiz@pkgsrc.org>2005-06-09 08:14:08 +0000
committerwiz <wiz@pkgsrc.org>2005-06-09 08:14:08 +0000
commite2d7a85a34916af37ab8040d2558f7c500ef6587 (patch)
treecc580ef99a4e0cf0367eba7c2b30c8196c80442c /security/audit-packages
parente549bb9cbf5fe9d44682a938e44e3af419f09fe9 (diff)
downloadpkgsrc-e2d7a85a34916af37ab8040d2558f7c500ef6587.tar.gz
Work around a bug in 1.6.2's mdoc macros (they don't know about .Ex).
Noted by reed@ Replace ".Xx Ns 's" by ".Xx Ap s" while here.
Diffstat (limited to 'security/audit-packages')
-rw-r--r--security/audit-packages/files/audit-packages.072
-rw-r--r--security/audit-packages/files/audit-packages.810
2 files changed, 42 insertions, 40 deletions
diff --git a/security/audit-packages/files/audit-packages.0 b/security/audit-packages/files/audit-packages.0
index 025782aa1b6..787eceeab4b 100644
--- a/security/audit-packages/files/audit-packages.0
+++ b/security/audit-packages/files/audit-packages.0
@@ -1,7 +1,7 @@
AUDIT-PACKAGES(8) NetBSD System Manager's Manual AUDIT-PACKAGES(8)
NNAAMMEE
- aauuddiitt--ppaacckkaaggeess, ddoowwnnllooaadd--vvuullnneerraabbiilliittyy--lliisstt -- show vulnerabilities in
+ aauuddiitt--ppaacckkaaggeess, ddoowwnnllooaadd--vvuullnneerraabbiilliittyy--lliisstt - show vulnerabilities in
installed packages
SSYYNNOOPPSSIISS
@@ -25,40 +25,40 @@ DDEESSCCRRIIPPTTIIOONN
Each line lists the package and vulnerable versions, the type of exploit,
and an Internet address for further information. The type of exploit can
be any text, although some common types of exploits listed are:
- ·· cross-site-html
- ·· cross-site-scripting
- ·· denial-of-service
- ·· file-permissions
- ·· local-access
- ·· local-code-execution
- ·· local-file-read
- ·· local-file-removal
- ·· local-file-write
- ·· local-root-file-view
- ·· local-root-shell
- ·· local-symlink-race
- ·· local-user-file-view
- ·· local-user-shell
- ·· privacy-leak
- ·· remote-code-execution
- ·· remote-command-inject
- ·· remote-file-creation
- ·· remote-file-read
- ·· remote-file-view
- ·· remote-file-write
- ·· remote-key-theft
- ·· remote-root-access
- ·· remote-root-shell
- ·· remote-script-inject
- ·· remote-server-admin
- ·· remote-use-of-secret
- ·· remote-user-access
- ·· remote-user-file-view
- ·· remote-user-shell
- ·· unknown
- ·· weak-authentication
- ·· weak-encryption
- ·· weak-ssl-authentication
+ ++oo cross-site-html
+ ++oo cross-site-scripting
+ ++oo denial-of-service
+ ++oo file-permissions
+ ++oo local-access
+ ++oo local-code-execution
+ ++oo local-file-read
+ ++oo local-file-removal
+ ++oo local-file-write
+ ++oo local-root-file-view
+ ++oo local-root-shell
+ ++oo local-symlink-race
+ ++oo local-user-file-view
+ ++oo local-user-shell
+ ++oo privacy-leak
+ ++oo remote-code-execution
+ ++oo remote-command-inject
+ ++oo remote-file-creation
+ ++oo remote-file-read
+ ++oo remote-file-view
+ ++oo remote-file-write
+ ++oo remote-key-theft
+ ++oo remote-root-access
+ ++oo remote-root-shell
+ ++oo remote-script-inject
+ ++oo remote-server-admin
+ ++oo remote-use-of-secret
+ ++oo remote-user-access
+ ++oo remote-user-file-view
+ ++oo remote-user-shell
+ ++oo unknown
+ ++oo weak-authentication
+ ++oo weak-encryption
+ ++oo weak-ssl-authentication
By default, the vulnerabilities file is stored in the @PKGVULNDIR@ direc-
tory. This can be changed by defining the environment variable
@@ -130,4 +130,4 @@ HHIISSTTOORRYY
September 19, 2000. The original idea came from Roland Dowdeswell and
Bill Sommerfeld.
-NetBSD 3.0 May 27, 2005 NetBSD 3.0
+NetBSD 2.0 May 27, 2005 NetBSD 2.0
diff --git a/security/audit-packages/files/audit-packages.8 b/security/audit-packages/files/audit-packages.8
index 762edfe40c7..22ca42d35cb 100644
--- a/security/audit-packages/files/audit-packages.8
+++ b/security/audit-packages/files/audit-packages.8
@@ -1,4 +1,4 @@
-.\" $NetBSD: audit-packages.8,v 1.11 2005/06/07 21:37:30 reed Exp $
+.\" $NetBSD: audit-packages.8,v 1.12 2005/06/09 08:14:08 wiz Exp $
.\"
.\" Copyright (c) 2003 Jeremy C. Reed. All rights reserved.
.\"
@@ -179,7 +179,7 @@ And
can be run via
.Xr cron 8
(or with
-.Nx Ns 's
+.Nx Ap s
.Pa /etc/security.local
daily security script).
.Pp
@@ -190,7 +190,9 @@ command can be forced to use IPv4 with the following setting in
.Pp
export FETCH_ARGS="-4"
.Sh DIAGNOSTICS
-.Ex -std audit-packages
+The
+.Nm
+utility exits 0 on success, and \*[Gt]0 if an error occurs.
.Pp
The following errors can occur:
.Bl -tag -width 10n
@@ -238,7 +240,7 @@ The
and
.Nm download-vulnerability-list
commands were originally implemented and added to
-.Nx Ns 's
+.Nx Ap s
pkgsrc by
.An Alistair Crooks
on September 19, 2000.