Back to checksecurity PTS page

Accepted checksecurity 2.0.7-2 (all source)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Fri, 11 Mar 2005 08:46:43 +0100
Source: checksecurity
Binary: checksecurity
Architecture: source all
Version: 2.0.7-2
Distribution: unstable
Urgency: low
Maintainer: Javier Fernandez-Sanguino Pen~a <jfs@computer.org>
Changed-By: Javier Fernandez-Sanguino Pen~a <jfs@computer.org>
Description: 
 checksecurity - basic system security checks
Closes: 31902 138484 274428 276950 291576 297691 298573
Changes: 
 checksecurity (2.0.7-2) unstable; urgency=low
 .
   * Adopted package (Closes: #298573)
   * Have the check_diskfree plugin mail to root the results of the test, if
     defined. Notice that the environment is currently cleaned up so that
     it will not work yet properly. This is the patch available in #232951
   * Fixed the formatting issue in the  check-setuid.8 manpage with the
     patch provided by Nicolas Francois (Closes: #274428)
   * Fixed the reference to checksecurity.conf in bin/checksecurity, the
     message now refers to checksecurity(8) (Closes: #276950)
   * Create /var/log/setuid with proper permissions (750), also, move the
     files in postinst through a loop checking first if they exist
     (Closes: #297691)
   * Rotate /var/log/setuid.changes, /var/log/diskfree.log and
     /var/log/checksecurity.log through logrotate instead of having this in
     the cron task, use dh_installlogrotate to install this.
   * Add Getopt::Long usage to bin/checksecurity and define a debug (-d or
     --debug option) (currently undocumented)
   * Introduce a 'period' argument in checksecurity (currently undocumented)
     which determines what checks should it run:
      - Modify global-checksecurity.conf so that diskfree and passwd checks
        are run daily and setuid is run weekly
      - Create a new checksecurity-weekly cron task that will run setuid
     This closes two long-standing bugs since users can adjust the
     configuration now to their needs. (Closes: #138484, #31902)
   * Recommend: Tiger, logcheck, and integrity checkers, also
     suggest some programs to check if newer packages are available,
     as bug #163813 has not been closed yet.
     This is an interim solution in order to warn users that
     there are more (advanced) security checks available they might want
     to implement in addition to checksecurity.
   * Added Czech po-debconf translation provided by Jan Outrata
     (Closes: #291576)
Files: 
 9cfac7a160ade4d97bb1330d78d7b79f 726 admin optional checksecurity_2.0.7-2.dsc
 7bb6a18089efe6d5108d9a633673924c 8626 admin optional checksecurity_2.0.7-2.diff.gz
 34cf809aee41ab3b5e554deb0d26f1b8 19922 admin optional checksecurity_2.0.7-2_all.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iQCVAwUBQjYynPtEPvakNq0lAQKKTwQAltDk2fSGGhoJObQstvkX7K29Qv9Xc+Q0
ocvWQbWJHmZZZfpX6k43DOl0evrWWeaZUNQAMDzKYS9RLR2La0YukqPETzjF6b6j
1Z0rh5D60TS9uPKM+m5sFWEP2BZXi4bgeFDra7mCZV5ZtgHGg+XG2wZjC+9ptBN4
GPKFc9RkmbM=
=mNO5
-----END PGP SIGNATURE-----


Accepted:
checksecurity_2.0.7-2.diff.gz
  to pool/main/c/checksecurity/checksecurity_2.0.7-2.diff.gz
checksecurity_2.0.7-2.dsc
  to pool/main/c/checksecurity/checksecurity_2.0.7-2.dsc
checksecurity_2.0.7-2_all.deb
  to pool/main/c/checksecurity/checksecurity_2.0.7-2_all.deb


-- 
To UNSUBSCRIBE, email to debian-devel-changes-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org