pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/security/audit-packages/files Work around a bug in 1.6...



details:   https://anonhg.NetBSD.org/pkgsrc/rev/c3936dbd9ebe
branches:  trunk
changeset: 495424:c3936dbd9ebe
user:      wiz <wiz%pkgsrc.org@localhost>
date:      Thu Jun 09 08:14:08 2005 +0000

description:
Work around a bug in 1.6.2's mdoc macros (they don't know about .Ex).
Noted by reed@

Replace ".Xx Ns 's" by ".Xx Ap s" while here.

diffstat:

 security/audit-packages/files/audit-packages.0 |  72 +++++++++++++-------------
 security/audit-packages/files/audit-packages.8 |  10 ++-
 2 files changed, 42 insertions(+), 40 deletions(-)

diffs (131 lines):

diff -r 2feebecabcc7 -r c3936dbd9ebe security/audit-packages/files/audit-packages.0
--- a/security/audit-packages/files/audit-packages.0    Thu Jun 09 08:08:26 2005 +0000
+++ b/security/audit-packages/files/audit-packages.0    Thu Jun 09 08:14:08 2005 +0000
@@ -1,7 +1,7 @@
 AUDIT-PACKAGES(8)       NetBSD System Manager's Manual       AUDIT-PACKAGES(8)
 
 NNAAMMEE
-     aauuddiitt--ppaacckkaaggeess, ddoowwnnllooaadd--vvuullnneerraabbiilliittyy--lliisstt -- show vulnerabilities in
+     aauuddiitt--ppaacckkaaggeess, ddoowwnnllooaadd--vvuullnneerraabbiilliittyy--lliisstt - show vulnerabilities in
      installed packages
 
 SSYYNNOOPPSSIISS
@@ -25,40 +25,40 @@
      Each line lists the package and vulnerable versions, the type of exploit,
      and an Internet address for further information.  The type of exploit can
      be any text, although some common types of exploits listed are:
-           ··   cross-site-html
-           ··   cross-site-scripting
-           ··   denial-of-service
-           ··   file-permissions
-           ··   local-access
-           ··   local-code-execution
-           ··   local-file-read
-           ··   local-file-removal
-           ··   local-file-write
-           ··   local-root-file-view
-           ··   local-root-shell
-           ··   local-symlink-race
-           ··   local-user-file-view
-           ··   local-user-shell
-           ··   privacy-leak
-           ··   remote-code-execution
-           ··   remote-command-inject
-           ··   remote-file-creation
-           ··   remote-file-read
-           ··   remote-file-view
-           ··   remote-file-write
-           ··   remote-key-theft
-           ··   remote-root-access
-           ··   remote-root-shell
-           ··   remote-script-inject
-           ··   remote-server-admin
-           ··   remote-use-of-secret
-           ··   remote-user-access
-           ··   remote-user-file-view
-           ··   remote-user-shell
-           ··   unknown
-           ··   weak-authentication
-           ··   weak-encryption
-           ··   weak-ssl-authentication
+           ++oo   cross-site-html
+           ++oo   cross-site-scripting
+           ++oo   denial-of-service
+           ++oo   file-permissions
+           ++oo   local-access
+           ++oo   local-code-execution
+           ++oo   local-file-read
+           ++oo   local-file-removal
+           ++oo   local-file-write
+           ++oo   local-root-file-view
+           ++oo   local-root-shell
+           ++oo   local-symlink-race
+           ++oo   local-user-file-view
+           ++oo   local-user-shell
+           ++oo   privacy-leak
+           ++oo   remote-code-execution
+           ++oo   remote-command-inject
+           ++oo   remote-file-creation
+           ++oo   remote-file-read
+           ++oo   remote-file-view
+           ++oo   remote-file-write
+           ++oo   remote-key-theft
+           ++oo   remote-root-access
+           ++oo   remote-root-shell
+           ++oo   remote-script-inject
+           ++oo   remote-server-admin
+           ++oo   remote-use-of-secret
+           ++oo   remote-user-access
+           ++oo   remote-user-file-view
+           ++oo   remote-user-shell
+           ++oo   unknown
+           ++oo   weak-authentication
+           ++oo   weak-encryption
+           ++oo   weak-ssl-authentication
 
      By default, the vulnerabilities file is stored in the @PKGVULNDIR@ direc-
      tory.  This can be changed by defining the environment variable
@@ -130,4 +130,4 @@
      September 19, 2000.  The original idea came from Roland Dowdeswell and
      Bill Sommerfeld.
 
-NetBSD 3.0                       May 27, 2005                       NetBSD 3.0
+NetBSD 2.0                       May 27, 2005                       NetBSD 2.0
diff -r 2feebecabcc7 -r c3936dbd9ebe security/audit-packages/files/audit-packages.8
--- a/security/audit-packages/files/audit-packages.8    Thu Jun 09 08:08:26 2005 +0000
+++ b/security/audit-packages/files/audit-packages.8    Thu Jun 09 08:14:08 2005 +0000
@@ -1,4 +1,4 @@
-.\" $NetBSD: audit-packages.8,v 1.11 2005/06/07 21:37:30 reed Exp $
+.\" $NetBSD: audit-packages.8,v 1.12 2005/06/09 08:14:08 wiz Exp $
 .\"
 .\" Copyright (c) 2003 Jeremy C. Reed.  All rights reserved.
 .\"
@@ -179,7 +179,7 @@
 can be run via
 .Xr cron 8
 (or with
-.Nx Ns 's
+.Nx Ap s
 .Pa /etc/security.local
 daily security script).
 .Pp
@@ -190,7 +190,9 @@
 .Pp
 export FETCH_ARGS="-4"
 .Sh DIAGNOSTICS
-.Ex -std audit-packages
+The
+.Nm
+utility exits 0 on success, and \*[Gt]0 if an error occurs.
 .Pp
 The following errors can occur: 
 .Bl -tag -width 10n
@@ -238,7 +240,7 @@
 and
 .Nm download-vulnerability-list
 commands were originally implemented and added to
-.Nx Ns 's
+.Nx Ap s
 pkgsrc by
 .An Alistair Crooks
 on September 19, 2000.



Home | Main Index | Thread Index | Old Index