Пакет cve-check-tool: Specfile

Name: cve-check-tool
Version: 5.6.4
Release: alt3.git.cbc2d0e
Summary: Command line tool for checking known (public) CVEs
Group: Other
License: GPLv2
Url: https://github.com/ikeydoherty/cve-check-tool
Source0: %name-%version-%release.tar

BuildRequires: libcurl-devel libgio-devel libsqlite3-devel libssl-devel libxml2-devel libjansson-devel libt1ha-devel

%description
The tool will identify potentially vunlnerable software packages within Linux
distributions through version matching. Where possible it will also seek to
determine (through a distribution implemention) if a vulnerability has been
addressed by way of a patch.

%prep
%setup -n %name-%version-%release

%build
%autoreconf
%configure
%make_build

%install
%makeinstall_std

%files
%_bindir/*
%_libdir/%{name}/*
%_datadir/%{name}/*
%_man1dir/%{name}*

%changelog
* Tue Jul 30 2019 Slava Aseev <ptrnine@altlinux.org> 5.6.4-alt3.git.cbc2d0e
- Migrate to NVD JSON Feed 1.0 (XML Feeds go away in October 9th of 2019)
- Common improvements:
  + Replace GLib 'g_str_hash' by 't1ha' hash function because the first
    one has too many collisions for CVE dataset (mainly due to small
    hash length)
  + Add optional runtime hash collision check (-H option)
  + Add executable for hash collision checking
  + Add optional feature for dropping '-dev' 'lib' and abi suffixes and
    prefixes from package names (-F option)
- Rpm plugin improvements:
  + Add scan of changelog section for finding already fixed CVEs
  + Fix mistake with patch numeration
  + Fix evaluation of rpm macroses

* Wed Aug 29 2018 Grigory Ustinov <grenka@altlinux.org> 5.6.4-alt2.git.cbc2d0e.1
- NMU: Rebuild with new openssl 1.1.0.

* Mon Apr 10 2018 Alexandr Antonov <aas@altlinux.org> 5.6.4-alt2.git.cbc2d0e
- Fixed field line breaks in a readable form (Closes: 33940)

* Wed Jun 14 2017 Sergey Novikov <sotor@altlinux.org> 5.6.4-alt1.git.cbc2d0e
- Add upstream commits to fix update error
- 5.6.4 Initial build for ALT