Your message dated Wed, 25 Jul 2018 03:00:11 +0000 with message-id <E1fiA27-000E4E-4o@fasolo.debian.org> and subject line Bug#902420: fixed in ivulncheck 0.1.65-1 has caused the Debian Bug report #902420, regarding ITP: ivulncheck -- reports cluster security vulnerabilities and fixes to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact owner@bugs.debian.org immediately.) -- 902420: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=902420 Debian Bug Tracking System Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: submit@bugs.debian.org
- Subject: ITP: ivulncheck -- reports cluster security vulnerabilities and fixes
- From: Gaëtan Egger <gaetan.egger@infomaniak.com>
- Date: Tue, 26 Jun 2018 14:25:48 +0200
- Message-id: <37aa9a95-a47b-3e7c-786b-36e2a2d892ad@infomaniak.com>
Package: wnpp Owner: Gaetan Egger <gaetan@egger-family.eu> Severity: wishlist * Package name : ivulncheck Version : 0.1.48 Upstream Author : Gaetan Egger <gaetan@egger-family.eu> * URL : https://salsa.debian.org/gegger-guest/ivulncheck.git * License : Apache-2.0 Programming Lang: Python3 Description : reports cluster security vulnerabilities and fixes Ivulncheck is a security tool to centralize the search of vulnerabilities and fixes concerning packages on a cluster. . A procedure is needed to initialize the API (restore an initial state of the MongoDB database, download ubuntu-cve-tracker tool, deploy CVE-Search modified API) . First, an agent script must be deployed to detect installed packages on the cluster (only Ubuntu and Debian are supported). This script generated a json formatted file and send it to ther API. Then, several commands must be executed to search vulnerabilities and determine available security updates (called here fixes). Four principals sources are used : . * debsecan for Debian hosts, * ubuntu-cve-tracker for Ubuntu hosts, * CVE-Search for custom installed application (manually configuration needed), * madison-lite (to complete missing fixes due to possibly outdated sources, missing sources or unreferenced vulnerabilities) . Eventually, you can get informations (installed packages, monitored hosts, known vulnerabilities an available fixes) directly from the API Or a Web Interface provide a graphical rendering of these informations.Attachment: signature.asc
Description: OpenPGP digital signature
--- End Message ---
--- Begin Message ---
- To: 902420-close@bugs.debian.org
- Subject: Bug#902420: fixed in ivulncheck 0.1.65-1
- From: Gaetan Egger <gaetan.egger@infomaniak.com>
- Date: Wed, 25 Jul 2018 03:00:11 +0000
- Message-id: <E1fiA27-000E4E-4o@fasolo.debian.org>
Source: ivulncheck Source-Version: 0.1.65-1 We believe that the bug you reported is fixed in the latest version of ivulncheck, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 902420@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Gaetan Egger <gaetan.egger@infomaniak.com> (supplier of updated ivulncheck package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmaster@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 1.8 Date: Wed, 18 Apr 2018 11:19:38 +0200 Source: ivulncheck Binary: ivulncheck-agent ivulncheck-api ivulncheck-client ivulncheck-web Architecture: source all Version: 0.1.65-1 Distribution: unstable Urgency: medium Maintainer: Gaetan Egger <gaetan.egger@infomaniak.com> Changed-By: Gaetan Egger <gaetan.egger@infomaniak.com> Description: ivulncheck-agent - reports cluster security vulnerabilities and fixes - Agent ivulncheck-api - reports cluster security vulnerabilities and fixes - API ivulncheck-client - reports cluster security vulnerabilities and fixes - Client ivulncheck-web - reports cluster security vulnerabilities and fixes - Web GUI Closes: 902420 Changes: ivulncheck (0.1.65-1) unstable; urgency=medium . * Initial release. (Closes: #902420) Checksums-Sha1: 69a6a4bfd383fba555a87dc891ff1e5cd6e8d2fa 2230 ivulncheck_0.1.65-1.dsc 14d227869f87b69f2be787544edf8772063f0387 235600 ivulncheck_0.1.65.orig.tar.xz cf9eaa2fc77aa04a69b4b1eab85ccfbcfb85f96c 5896 ivulncheck_0.1.65-1.debian.tar.xz d18b92c243e793f51330ce85af42bbd2f97525ea 6212 ivulncheck-agent_0.1.65-1_all.deb f0510ba743b65215b9a33543d6b0b6c0133600cb 55116 ivulncheck-api_0.1.65-1_all.deb 09ede39804c71fa3eba7c0a11d3f537171c7a925 11292 ivulncheck-client_0.1.65-1_all.deb 50d3f448b74ee11d1d0da8312e6fc9bb717bbfdc 193276 ivulncheck-web_0.1.65-1_all.deb c41dbdf860048f41c84ea5490b21900b390a73c2 9155 ivulncheck_0.1.65-1_amd64.buildinfo Checksums-Sha256: 12e86b186887c63cb3e50bad56c8a56166cb2acb510e2cb79d61b307fb6b3d03 2230 ivulncheck_0.1.65-1.dsc ba40100313993c1a7d6f7f9e5fe58b766f0f5066d44ed48d548c2921ca10c253 235600 ivulncheck_0.1.65.orig.tar.xz 5015ec1e95be48adc25f1bab646a552ba9be3c2ab7b94816d38f755ac59aa3a8 5896 ivulncheck_0.1.65-1.debian.tar.xz 973b26740eb9129d9672776da0efb6797995ed35d8794de872c3d7c2acde755b 6212 ivulncheck-agent_0.1.65-1_all.deb 9821e49f5bb79158f43b95351a9f374201266c11570278c9ef43e9bdd33f10a4 55116 ivulncheck-api_0.1.65-1_all.deb 135fcc9a12245743550ab4d0a1e5dd4469ac8319383e1246e3b21eac22087f9a 11292 ivulncheck-client_0.1.65-1_all.deb d39075667152e301ae8f916f6152324ea376461e136083737bd57aa1120408c4 193276 ivulncheck-web_0.1.65-1_all.deb f4fd889282279296b97809cd8d099c2713e06027b445df11d09675fe627ee05e 9155 ivulncheck_0.1.65-1_amd64.buildinfo Files: e658ab7c01f983d5de3c0b16ac9f4a12 2230 admin optional ivulncheck_0.1.65-1.dsc 2a9bcd8549a522bb56870b0673d56ed3 235600 admin optional ivulncheck_0.1.65.orig.tar.xz 640a4ca37ce62190de459e304b5392ed 5896 admin optional ivulncheck_0.1.65-1.debian.tar.xz 2dc6af117346b60d8877d106ddfc17da 6212 admin optional ivulncheck-agent_0.1.65-1_all.deb 8b3e3aa33aae3be59f5748c147473037 55116 admin optional ivulncheck-api_0.1.65-1_all.deb d3350ff6fedc774ad67ee1d80f265de0 11292 admin optional ivulncheck-client_0.1.65-1_all.deb 08b3298de83aa11d81e173443fce931d 193276 admin optional ivulncheck-web_0.1.65-1_all.deb 95b8d93dd478b7f5165a23fcfd3941af 9155 admin optional ivulncheck_0.1.65-1_amd64.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtKCq/KhshgVdBnYUq1PlA1hod6YFAltXO+EACgkQq1PlA1ho d6YKkg//TkqgZIxIMcqeb9icIrvZL1B9vCrYMEp3dh8vylndb67iW9crCrVbQs6D KfocUtCqfFCRfoAc2j4IbIJeHxMaJVgYSU8/rk4Y5kV0IA7y4aQx7wwkgZm6XIO/ wXJHSb45/CIfQP7dPzqQ/SE+vRUykdFokXJCuPP0T/ryTIKw2j/kBYALodGXGBdV zmAjWMf/w/1c6AMvB5ZI3ubfaiI8EtOf9552m0L7GlocVUx4BKXfooqa4OnLG72P 74UN9VJGZmAZ0Fbvs917XyHcdBLz67qOSUqAFESdVIrShEdzWVSSjrhsZWQUk7dY ieHbZmWEfeHVqZEhgkiSGdBwRiq/xSZW5Rb51B/zL6zaYfJGjqjEQibGhaV1ti2W axLnkdfrDQxJWnQzy+DCUAlVZ6aADgXyCz+bZiZCEhlZp6KrjVaDmdCm+Sh6MB3+ t9LaZFhhYBhD1+ajzNVYJyFuaIJiI1XQCIWbQ65eUzILoes7lCbuGKDCa3NdcCRz MtZA2hknTSJyfewQq+nUxvHqtZmx70BdO3TTmhD/yuQmcUUyGnHEWL4SHEaih5i0 5HRGCky7LQ8tYOAslpxPcIdICGsEeCtHOg4ItCyenTgDO63lhG9tBFQMhWsWTA/q LOs+yo53L4QEiniSxmIdjFfXZJzOfF6LPelQC16souTjmNlClcI= =VabO -----END PGP SIGNATURE-----
--- End Message ---