summaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorwiz <wiz>2005-06-09 08:14:08 +0000
committerwiz <wiz>2005-06-09 08:14:08 +0000
commit9dd547b161c2e1bebb6c2e3047444af541c4c5c1 (patch)
treecc580ef99a4e0cf0367eba7c2b30c8196c80442c /security
parent31c11488eb9176e03838a939e8ad300ebbd1c5e2 (diff)
downloadpkgsrc-9dd547b161c2e1bebb6c2e3047444af541c4c5c1.tar.gz
Work around a bug in 1.6.2's mdoc macros (they don't know about .Ex).
Noted by reed@ Replace ".Xx Ns 's" by ".Xx Ap s" while here.
Diffstat (limited to 'security')
-rw-r--r--security/audit-packages/files/audit-packages.072
-rw-r--r--security/audit-packages/files/audit-packages.810
2 files changed, 42 insertions, 40 deletions
diff --git a/security/audit-packages/files/audit-packages.0 b/security/audit-packages/files/audit-packages.0
index 025782aa1b6..787eceeab4b 100644
--- a/security/audit-packages/files/audit-packages.0
+++ b/security/audit-packages/files/audit-packages.0
@@ -1,7 +1,7 @@
AUDIT-PACKAGES(8) NetBSD System Manager's Manual AUDIT-PACKAGES(8)
NNAAMMEE
- aauuddiitt--ppaacckkaaggeess, ddoowwnnllooaadd--vvuullnneerraabbiilliittyy--lliisstt -- show vulnerabilities in
+ aauuddiitt--ppaacckkaaggeess, ddoowwnnllooaadd--vvuullnneerraabbiilliittyy--lliisstt - show vulnerabilities in
installed packages
SSYYNNOOPPSSIISS
@@ -25,40 +25,40 @@ DDEESSCCRRIIPPTTIIOONN
Each line lists the package and vulnerable versions, the type of exploit,
and an Internet address for further information. The type of exploit can
be any text, although some common types of exploits listed are:
- ·· cross-site-html
- ·· cross-site-scripting
- ·· denial-of-service
- ·· file-permissions
- ·· local-access
- ·· local-code-execution
- ·· local-file-read
- ·· local-file-removal
- ·· local-file-write
- ·· local-root-file-view
- ·· local-root-shell
- ·· local-symlink-race
- ·· local-user-file-view
- ·· local-user-shell
- ·· privacy-leak
- ·· remote-code-execution
- ·· remote-command-inject
- ·· remote-file-creation
- ·· remote-file-read
- ·· remote-file-view
- ·· remote-file-write
- ·· remote-key-theft
- ·· remote-root-access
- ·· remote-root-shell
- ·· remote-script-inject
- ·· remote-server-admin
- ·· remote-use-of-secret
- ·· remote-user-access
- ·· remote-user-file-view
- ·· remote-user-shell
- ·· unknown
- ·· weak-authentication
- ·· weak-encryption
- ·· weak-ssl-authentication
+ ++oo cross-site-html
+ ++oo cross-site-scripting
+ ++oo denial-of-service
+ ++oo file-permissions
+ ++oo local-access
+ ++oo local-code-execution
+ ++oo local-file-read
+ ++oo local-file-removal
+ ++oo local-file-write
+ ++oo local-root-file-view
+ ++oo local-root-shell
+ ++oo local-symlink-race
+ ++oo local-user-file-view
+ ++oo local-user-shell
+ ++oo privacy-leak
+ ++oo remote-code-execution
+ ++oo remote-command-inject
+ ++oo remote-file-creation
+ ++oo remote-file-read
+ ++oo remote-file-view
+ ++oo remote-file-write
+ ++oo remote-key-theft
+ ++oo remote-root-access
+ ++oo remote-root-shell
+ ++oo remote-script-inject
+ ++oo remote-server-admin
+ ++oo remote-use-of-secret
+ ++oo remote-user-access
+ ++oo remote-user-file-view
+ ++oo remote-user-shell
+ ++oo unknown
+ ++oo weak-authentication
+ ++oo weak-encryption
+ ++oo weak-ssl-authentication
By default, the vulnerabilities file is stored in the @PKGVULNDIR@ direc-
tory. This can be changed by defining the environment variable
@@ -130,4 +130,4 @@ HHIISSTTOORRYY
September 19, 2000. The original idea came from Roland Dowdeswell and
Bill Sommerfeld.
-NetBSD 3.0 May 27, 2005 NetBSD 3.0
+NetBSD 2.0 May 27, 2005 NetBSD 2.0
diff --git a/security/audit-packages/files/audit-packages.8 b/security/audit-packages/files/audit-packages.8
index 762edfe40c7..22ca42d35cb 100644
--- a/security/audit-packages/files/audit-packages.8
+++ b/security/audit-packages/files/audit-packages.8
@@ -1,4 +1,4 @@
-.\" $NetBSD: audit-packages.8,v 1.11 2005/06/07 21:37:30 reed Exp $
+.\" $NetBSD: audit-packages.8,v 1.12 2005/06/09 08:14:08 wiz Exp $
.\"
.\" Copyright (c) 2003 Jeremy C. Reed. All rights reserved.
.\"
@@ -179,7 +179,7 @@ And
can be run via
.Xr cron 8
(or with
-.Nx Ns 's
+.Nx Ap s
.Pa /etc/security.local
daily security script).
.Pp
@@ -190,7 +190,9 @@ command can be forced to use IPv4 with the following setting in
.Pp
export FETCH_ARGS="-4"
.Sh DIAGNOSTICS
-.Ex -std audit-packages
+The
+.Nm
+utility exits 0 on success, and \*[Gt]0 if an error occurs.
.Pp
The following errors can occur:
.Bl -tag -width 10n
@@ -238,7 +240,7 @@ The
and
.Nm download-vulnerability-list
commands were originally implemented and added to
-.Nx Ns 's
+.Nx Ap s
pkgsrc by
.An Alistair Crooks
on September 19, 2000.