tiger 1:3.2.3-15 source package in Ubuntu

Changelog

tiger (1:3.2.3-15) unstable; urgency=medium

  * Acknowledge previous NMU (thank you Francois Marier)
    (Closes: 830714, 830716, 848621)
  * debian/compat: Update to compatibility version 11
  * debian/control: Update to standards version  4.1.3
    - Remove debian/tiger.menu
    - Add the upstream key in debian/upstream and the 'gpsigurlmangle' in
      debian/watch
    - Use https url in debian/control VCS-Git headers
    - debian/tiger.menu: Remove as we already have a .desktop file as per
      Technical CTTE decission #741573 (and fix lintian error)
    - debian/rules: Add build-arch and build-indep targets (fix lintian error)
  * Include content provided in GIT repository upstream including:
     - script/check_accounts: Fix error when eval'ing code
     - script/check_passwd: Add a check of the sudoers files using visudo
     - systems/Linux/2/check: Disable deb_checkadvisories as the Debian website
        content does not provide information to generate up to date listing
        of advisories. This feature can be best implemented using apticron,
        cront-apt or painintheapt 
     - systems/Linux/2/deb_checkmd5sums: Do not call prelink with -c
     - systems/Linux/2/gen_mounts: Update with a large number of filesystems
       currently supported in the Kernel. Additionally, to prevent false
       positives, try to determine if the filesystem is within the list of
       supported filesystems in the kernel by using two different mechanisms.
       This should reduce the number of configuration warnings in the future
       (and the need to update this script whenever a new, esoteric,
       filesystem is used)
     - util/genmsgidx: Do not assume the tempfile binary exists, check first.
     - tigerrc, system/Linux/2/check: Make it possible to disable or enable
       the Debian specific checks using the patch provided by Nicholas Bamber
       (Closes: 512085)
     - ./systems/Linux/2/check_listeningprocs: Handle all addresses in the
       127.0.0.0/8 range as loopback addresses
     - scripts/check_signatures: Fix interpretation of md5sum output which
        was broken in the script 

 -- Javier Fernández-Sanguino Peña <email address hidden>  Sun, 04 Feb 2018 20:44:04 +0100

Upload details

Uploaded by:
Javier Fernández-Sanguino
Uploaded to:
Sid
Original maintainer:
Javier Fernández-Sanguino
Architectures:
any
Section:
admin
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
tiger_3.2.3-15.dsc 1.9 KiB cc11a34f763d1bcc646b1decca673936af4d2ec024bdd597df1c0a983319c4d8
tiger_3.2.3.orig.tar.gz 991.4 KiB 80db27618de0d806805e77653e568fb9ae556537cfd5a4b17b6b6c9dc442a415
tiger_3.2.3-15.diff.gz 255.0 KiB 53be62e721bfc6944b7b6a15b935c8de02609b4dbd933c1dd0359c98445423eb

Available diffs

No changes file available.

Binary packages built by this source

tiger: Report system security vulnerabilities

 TIGER, or the 'tiger' scripts, is a set of Bourne shell scripts, C programs
 and data files which are used to perform a security audit of different
 operating systems. The tools can be both run altogether once to generate an
 audit report of the system and they can also be run periodically to
 provide information on changes to the system's security once a
 security baseline has been defined. Consequently, they can be used
 also as a host intrusion detection mechanism.
 .
 The tools rely on specialised external security tools such as John the Ripper,
 Chkroot and integrity check tools (like Tripwire, Integrit or Aide) for some
 of the tasks. The periodic review mechanism relies on the use of the cron task
 scheduler and an email delivery system.
 .
 TIGER has one primary goal: report ways the system's security can be
 compromised.
 .
 Debian's TIGER incorporates new checks primarily oriented towards Debian
 distribution including: md5sums checks of installed files, location of files
 not belonging to packages, and analysis of local listening processes.
 .
 This package provides all the security scripts and data files.

tiger-dbgsym: debug symbols for tiger
tiger-otheros: Scripts to run Tiger in other operating systems

 TIGER, or the 'tiger' scripts, is a set of Bourne shell scripts, C programs
 and data files which are used to perform a security audit of different
 operating systems. The tools can be both run altogether once to generate an
 audit report of the system and they can also be run periodically to
 provide information on changes to the system's security once a
 security baseline has been defined. Consequently, they can be used
 also as a host intrusion detection mechanism.
 .
 This package provides all the scripts for operating systems other than Linux
 provided for in the Tiger distribution. It is provided in the hope it will be
 useful for administrators that wish to run tiger in a distributed environment
 sharing these files through the network (e.g. NFS).