Пакет cve-check-tool: Specfile
Name: cve-check-tool Version: 5.6.4 Release: alt3.git.cbc2d0e Summary: Command line tool for checking known (public) CVEs Group: Other License: GPLv2 Url: https://github.com/ikeydoherty/cve-check-tool Source0: %name-%version-%release.tar BuildRequires: libcurl-devel libgio-devel libsqlite3-devel libssl-devel libxml2-devel libjansson-devel libt1ha-devel %description The tool will identify potentially vunlnerable software packages within Linux distributions through version matching. Where possible it will also seek to determine (through a distribution implemention) if a vulnerability has been addressed by way of a patch. %prep %setup -n %name-%version-%release %build %autoreconf %configure %make_build %install %makeinstall_std %files %_bindir/* %_libdir/%{name}/* %_datadir/%{name}/* %_man1dir/%{name}* %changelog * Tue Jul 30 2019 Slava Aseev <ptrnine@altlinux.org> 5.6.4-alt3.git.cbc2d0e - Migrate to NVD JSON Feed 1.0 (XML Feeds go away in October 9th of 2019) - Common improvements: + Replace GLib 'g_str_hash' by 't1ha' hash function because the first one has too many collisions for CVE dataset (mainly due to small hash length) + Add optional runtime hash collision check (-H option) + Add executable for hash collision checking + Add optional feature for dropping '-dev' 'lib' and abi suffixes and prefixes from package names (-F option) - Rpm plugin improvements: + Add scan of changelog section for finding already fixed CVEs + Fix mistake with patch numeration + Fix evaluation of rpm macroses * Wed Aug 29 2018 Grigory Ustinov <grenka@altlinux.org> 5.6.4-alt2.git.cbc2d0e.1 - NMU: Rebuild with new openssl 1.1.0. * Mon Apr 10 2018 Alexandr Antonov <aas@altlinux.org> 5.6.4-alt2.git.cbc2d0e - Fixed field line breaks in a readable form (Closes: 33940) * Wed Jun 14 2017 Sergey Novikov <sotor@altlinux.org> 5.6.4-alt1.git.cbc2d0e - Add upstream commits to fix update error - 5.6.4 Initial build for ALT |