Age | Commit message (Collapse) | Author | Files | Lines |
|
Instead of using the number of bytes to determine whether or not the
file has shrunk, use the number of lines. This will allow for
spelling corrections, login name of committers being shorter than
others, etc. This is a temporary measure until a better distribution
mechanism is used. Suggested by David Brownlee.
|
|
|
|
|
|
It broke installation of audit-packages as the first package in the system.
Okayed by Alistair.
|
|
|
|
Bump to 1.16.
|
|
The directory ${PKGVULNDIR)} holding the 'vulnerabilities' file
which default value is determined at configure time can now be
overridden at runtime from the environment.
As a side effect the strings substituted at configure time in
files/{audit-packages,download-vulnerability-list} are now of the
form '@VAR@' and not '${VAR}'.
|
|
store the vulnerabilities file. This variable was already recognized by
audit-packages but not by bsd.pkg.mk which hardcoded DISTDIR.
|
|
|
|
fetch error if FETCH_CMD is e.g. ``curl -O''. No functional changes.
|
|
|
|
Addresses part of pkg/17368.
Bump to 1.14.
|
|
|
|
the latter is not appropriate. The former defaults to the latter.
Bump version to 1.12. Per discussion with Alistair Crooks.
|
|
Toru TAKAMIZU <ttaka@ma1.seikyou.ne.jp>
|
|
Bump version to 1.11
|
|
|
|
|
|
Solaris. Bump to 1.10.
|
|
Noted by Kimmo Suominen. Bump to 1.9.
|
|
Fix a problem which occurs if the vulnerability list does not already exist.
This fixes PR 12763 from Brian de Alwis (bsd@cs.ubc.ca), albeit in a
slightly different manner. (I also added a check for the existence of
the new vulnerabilities file, in case it was not downloaded for some
reason).
|
|
Incorporates the following changes from Anne Bennett
(anne@alcor.concordia.ca) in PR 12538:
(1) Running download-vulnerability-list as it stands from cron will
spam the sysadmin with ftp output. Easy to fix: redirect output
to /dev/null as per the example in pkg/MESSAGE. Problem: now
we lose some error messages as well. Patch: make sure error
complaints in that script are spouted to STDERR, not STDOUT.
(3) Minor readability issue: set the source location for the
vulnerability list in a variable at the top of the script.
(4) PR 12457 reported that audit-packages complained spuriously
when the vulnerability list had not been updated in over a
week, and suggested touching it as a solution. This loses
the information of when the file was really last updated.
I'd prefer to always "mv" the new file into place, and use
mtime instead of ctime in the file freshness test.
I did this part of the PR differently, as I was worried about
incomplete vulnerability lists being downloaded, and overwriting an
existing vulnerability list:
(2) ftp failure in download-vulnerability-list is not being detected
properly by the current "${FETCH_CMD} .. || (complain; exit 1)"
test. Patch: test for a non-zero vulnerability file instead.
Don't forget to remove any zero-length droppings, if any.
We know that the vulnerability list size will increase, and not
decrease, so test the size of the newly-downloaded file. If the new
file is smaller than the existing file, then a bad transfer has taken
place - log this fact, and remove the new list.
|
|
Always touch the downloaded vulnerability list, so that the audit-packages
script doesn't moan erroneously.
From Jim Bernard, in PR 12457.
|
|
one - addresses 2nd part of PR 12457, from Jim Bernard.
|
|
existence of ${DISTDIR}, and to create it if it doesn't exist. This
is for machines built with binary packages, which lack pkgsrc, but
this way preserves the location of the vulnerabilities file.
Addresses PR 12367
|
|
and the vulnerabilities file be downloaded via cron every day.
|
|
|
|
when vulnerability list is not updated for more than a week.
solves PR 11463 (there are other ways to solve this, i'm open to your opinion).
|
|
check if vulnerabilities file is more than a week old, and whine if it is
whine to stderr rather than stdout
|
|
file not present.
|
|
installed packages which are insecure and open to exploitation.
The original idea came from Roland Dowdeswell and Bill Sommerfeld, quite
independently, the unorthodox implementation by me.
This package contains two scripts:
(1) download-vulnerability-list, which downloads a list of vulnerable
packages from the NetBSD ftp server, and
(2) audit-packages, which scans all the packages installed on the
local machine, looking for packages which are vulnerable.
|