Пакет cve-manager: Информация
Default inline alert: Версия в репозитории: 0.86.1-alt1
Исходный пакет: cve-manager
Версия: 0.72.0-alt1
Собран: 25 марта 2023 г. 23:52 в задании #317057
Категория: Прочее
Сообщить об ошибке в пакетеДомашняя страница: https://www.altlinux.org/CVE-Manager
Лицензия: GPLv3
О пакете: CVE-management toolkit
Описание:
cve-manager is an utilities toolkit used to form a database of vulnerabilities (VUL DB) using MySQL, and to provide an easy interface to that DB.
Список rpm-пакетов, предоставляемых данным srpm-пакетом:
cpe-map (x86_64, ppc64le, aarch64)
cve-backup (x86_64, ppc64le, aarch64)
cve-download (x86_64, ppc64le, aarch64)
cve-history (x86_64, ppc64le, aarch64)
cve-import (x86_64, ppc64le, aarch64)
cve-import-debuginfo (x86_64, ppc64le, aarch64)
cve-issues (x86_64, ppc64le, aarch64)
cve-manager (x86_64, ppc64le, aarch64)
cve-manager-common (x86_64, ppc64le, aarch64)
cve-monitor (x86_64, ppc64le, aarch64)
libcve-manager (x86_64, ppc64le, aarch64)
libcve-manager-debuginfo (x86_64, ppc64le, aarch64)
cpe-map (x86_64, ppc64le, aarch64)
cve-backup (x86_64, ppc64le, aarch64)
cve-download (x86_64, ppc64le, aarch64)
cve-history (x86_64, ppc64le, aarch64)
cve-import (x86_64, ppc64le, aarch64)
cve-import-debuginfo (x86_64, ppc64le, aarch64)
cve-issues (x86_64, ppc64le, aarch64)
cve-manager (x86_64, ppc64le, aarch64)
cve-manager-common (x86_64, ppc64le, aarch64)
cve-monitor (x86_64, ppc64le, aarch64)
libcve-manager (x86_64, ppc64le, aarch64)
libcve-manager-debuginfo (x86_64, ppc64le, aarch64)
Сопровождающий: Alexey Appolonov
Последнее изменение
24 марта 2023 г. Alexey Appolonov 0.72.0-alt1
- Package releases are taken into account when excluding issues; - The "cve-issues" module can process manually specified package versions/releases (the "cve-monitor-check-update" module is no longer needed and has been removed).
3 марта 2023 г. Alexey Appolonov 0.71.6-alt1
- Fixed issues detection for the kernel packages.
22 января 2023 г. Alexey Appolonov 0.71.5-alt1
- Backslashes, which may be part of the names of vendors and products imported from NVD lists, are ignored (they are used to escape special symbols in the names and at the same time they complicate the processing or require the use of escape symbols in the "cve-manager-inner-knowledge" lists).