Package cve-manager: Information
Default inline alert: Version in the repository: 0.86.1-alt1
Source package: cve-manager
Version: 0.72.0-alt1
Build time: Mar 25, 2023, 11:52 PM in the task #317057
Category: Other
Report package bugHome page: https://www.altlinux.org/CVE-Manager
License: GPLv3
Summary: CVE-management toolkit
Description:
cve-manager is an utilities toolkit used to form a database of vulnerabilities (VUL DB) using MySQL, and to provide an easy interface to that DB.
List of rpms provided by this srpm:
cpe-map (x86_64, ppc64le, aarch64)
cve-backup (x86_64, ppc64le, aarch64)
cve-download (x86_64, ppc64le, aarch64)
cve-history (x86_64, ppc64le, aarch64)
cve-import (x86_64, ppc64le, aarch64)
cve-import-debuginfo (x86_64, ppc64le, aarch64)
cve-issues (x86_64, ppc64le, aarch64)
cve-manager (x86_64, ppc64le, aarch64)
cve-manager-common (x86_64, ppc64le, aarch64)
cve-monitor (x86_64, ppc64le, aarch64)
libcve-manager (x86_64, ppc64le, aarch64)
libcve-manager-debuginfo (x86_64, ppc64le, aarch64)
cpe-map (x86_64, ppc64le, aarch64)
cve-backup (x86_64, ppc64le, aarch64)
cve-download (x86_64, ppc64le, aarch64)
cve-history (x86_64, ppc64le, aarch64)
cve-import (x86_64, ppc64le, aarch64)
cve-import-debuginfo (x86_64, ppc64le, aarch64)
cve-issues (x86_64, ppc64le, aarch64)
cve-manager (x86_64, ppc64le, aarch64)
cve-manager-common (x86_64, ppc64le, aarch64)
cve-monitor (x86_64, ppc64le, aarch64)
libcve-manager (x86_64, ppc64le, aarch64)
libcve-manager-debuginfo (x86_64, ppc64le, aarch64)
Maintainer: Alexey Appolonov
Last changed
March 24, 2023 Alexey Appolonov 0.72.0-alt1
- Package releases are taken into account when excluding issues; - The "cve-issues" module can process manually specified package versions/releases (the "cve-monitor-check-update" module is no longer needed and has been removed).
March 3, 2023 Alexey Appolonov 0.71.6-alt1
- Fixed issues detection for the kernel packages.
Jan. 22, 2023 Alexey Appolonov 0.71.5-alt1
- Backslashes, which may be part of the names of vendors and products imported from NVD lists, are ignored (they are used to escape special symbols in the names and at the same time they complicate the processing or require the use of escape symbols in the "cve-manager-inner-knowledge" lists).