[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#902420: marked as done (ITP: ivulncheck -- reports cluster security vulnerabilities and fixes)



Your message dated Wed, 25 Jul 2018 03:00:11 +0000
with message-id <E1fiA27-000E4E-4o@fasolo.debian.org>
and subject line Bug#902420: fixed in ivulncheck 0.1.65-1
has caused the Debian Bug report #902420,
regarding ITP: ivulncheck -- reports cluster security vulnerabilities and fixes
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
902420: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=902420
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: wnpp
Owner: Gaetan Egger <gaetan@egger-family.eu>
Severity: wishlist

* Package name    : ivulncheck
  Version         : 0.1.48
  Upstream Author : Gaetan Egger <gaetan@egger-family.eu>
* URL             : https://salsa.debian.org/gegger-guest/ivulncheck.git
* License         : Apache-2.0
  Programming Lang: Python3
  Description     : reports cluster security vulnerabilities and fixes

 Ivulncheck is a security tool to centralize the search of
vulnerabilities and
 fixes concerning packages on a cluster.
 .
 A procedure is needed to initialize the API (restore an initial state
 of the MongoDB database, download ubuntu-cve-tracker tool, deploy
 CVE-Search modified API)
 .
 First, an agent script must be deployed to detect installed packages on
 the cluster (only Ubuntu and Debian are supported). This script
 generated a json formatted file and send it to ther API. Then, several
 commands must be executed to search vulnerabilities and determine
 available security updates (called here fixes). Four principals sources
 are used :
 .
  * debsecan for Debian hosts,
  * ubuntu-cve-tracker for Ubuntu hosts,
  * CVE-Search for custom installed application (manually configuration
    needed),
  * madison-lite (to complete missing fixes due to possibly outdated
    sources, missing sources or unreferenced vulnerabilities)
 .
 Eventually, you can get informations (installed packages, monitored
 hosts, known vulnerabilities an available fixes) directly from the API
 Or a Web Interface provide a graphical rendering of these informations.


Attachment: signature.asc
Description: OpenPGP digital signature


--- End Message ---
--- Begin Message ---
Source: ivulncheck
Source-Version: 0.1.65-1

We believe that the bug you reported is fixed in the latest version of
ivulncheck, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 902420@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Gaetan Egger <gaetan.egger@infomaniak.com> (supplier of updated ivulncheck package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 18 Apr 2018 11:19:38 +0200
Source: ivulncheck
Binary: ivulncheck-agent ivulncheck-api ivulncheck-client ivulncheck-web
Architecture: source all
Version: 0.1.65-1
Distribution: unstable
Urgency: medium
Maintainer: Gaetan Egger <gaetan.egger@infomaniak.com>
Changed-By: Gaetan Egger <gaetan.egger@infomaniak.com>
Description:
 ivulncheck-agent - reports cluster security vulnerabilities and fixes - Agent
 ivulncheck-api - reports cluster security vulnerabilities and fixes - API
 ivulncheck-client - reports cluster security vulnerabilities and fixes - Client
 ivulncheck-web - reports cluster security vulnerabilities and fixes - Web GUI
Closes: 902420
Changes:
 ivulncheck (0.1.65-1) unstable; urgency=medium
 .
   * Initial release. (Closes: #902420)
Checksums-Sha1:
 69a6a4bfd383fba555a87dc891ff1e5cd6e8d2fa 2230 ivulncheck_0.1.65-1.dsc
 14d227869f87b69f2be787544edf8772063f0387 235600 ivulncheck_0.1.65.orig.tar.xz
 cf9eaa2fc77aa04a69b4b1eab85ccfbcfb85f96c 5896 ivulncheck_0.1.65-1.debian.tar.xz
 d18b92c243e793f51330ce85af42bbd2f97525ea 6212 ivulncheck-agent_0.1.65-1_all.deb
 f0510ba743b65215b9a33543d6b0b6c0133600cb 55116 ivulncheck-api_0.1.65-1_all.deb
 09ede39804c71fa3eba7c0a11d3f537171c7a925 11292 ivulncheck-client_0.1.65-1_all.deb
 50d3f448b74ee11d1d0da8312e6fc9bb717bbfdc 193276 ivulncheck-web_0.1.65-1_all.deb
 c41dbdf860048f41c84ea5490b21900b390a73c2 9155 ivulncheck_0.1.65-1_amd64.buildinfo
Checksums-Sha256:
 12e86b186887c63cb3e50bad56c8a56166cb2acb510e2cb79d61b307fb6b3d03 2230 ivulncheck_0.1.65-1.dsc
 ba40100313993c1a7d6f7f9e5fe58b766f0f5066d44ed48d548c2921ca10c253 235600 ivulncheck_0.1.65.orig.tar.xz
 5015ec1e95be48adc25f1bab646a552ba9be3c2ab7b94816d38f755ac59aa3a8 5896 ivulncheck_0.1.65-1.debian.tar.xz
 973b26740eb9129d9672776da0efb6797995ed35d8794de872c3d7c2acde755b 6212 ivulncheck-agent_0.1.65-1_all.deb
 9821e49f5bb79158f43b95351a9f374201266c11570278c9ef43e9bdd33f10a4 55116 ivulncheck-api_0.1.65-1_all.deb
 135fcc9a12245743550ab4d0a1e5dd4469ac8319383e1246e3b21eac22087f9a 11292 ivulncheck-client_0.1.65-1_all.deb
 d39075667152e301ae8f916f6152324ea376461e136083737bd57aa1120408c4 193276 ivulncheck-web_0.1.65-1_all.deb
 f4fd889282279296b97809cd8d099c2713e06027b445df11d09675fe627ee05e 9155 ivulncheck_0.1.65-1_amd64.buildinfo
Files:
 e658ab7c01f983d5de3c0b16ac9f4a12 2230 admin optional ivulncheck_0.1.65-1.dsc
 2a9bcd8549a522bb56870b0673d56ed3 235600 admin optional ivulncheck_0.1.65.orig.tar.xz
 640a4ca37ce62190de459e304b5392ed 5896 admin optional ivulncheck_0.1.65-1.debian.tar.xz
 2dc6af117346b60d8877d106ddfc17da 6212 admin optional ivulncheck-agent_0.1.65-1_all.deb
 8b3e3aa33aae3be59f5748c147473037 55116 admin optional ivulncheck-api_0.1.65-1_all.deb
 d3350ff6fedc774ad67ee1d80f265de0 11292 admin optional ivulncheck-client_0.1.65-1_all.deb
 08b3298de83aa11d81e173443fce931d 193276 admin optional ivulncheck-web_0.1.65-1_all.deb
 95b8d93dd478b7f5165a23fcfd3941af 9155 admin optional ivulncheck_0.1.65-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEtKCq/KhshgVdBnYUq1PlA1hod6YFAltXO+EACgkQq1PlA1ho
d6YKkg//TkqgZIxIMcqeb9icIrvZL1B9vCrYMEp3dh8vylndb67iW9crCrVbQs6D
KfocUtCqfFCRfoAc2j4IbIJeHxMaJVgYSU8/rk4Y5kV0IA7y4aQx7wwkgZm6XIO/
wXJHSb45/CIfQP7dPzqQ/SE+vRUykdFokXJCuPP0T/ryTIKw2j/kBYALodGXGBdV
zmAjWMf/w/1c6AMvB5ZI3ubfaiI8EtOf9552m0L7GlocVUx4BKXfooqa4OnLG72P
74UN9VJGZmAZ0Fbvs917XyHcdBLz67qOSUqAFESdVIrShEdzWVSSjrhsZWQUk7dY
ieHbZmWEfeHVqZEhgkiSGdBwRiq/xSZW5Rb51B/zL6zaYfJGjqjEQibGhaV1ti2W
axLnkdfrDQxJWnQzy+DCUAlVZ6aADgXyCz+bZiZCEhlZp6KrjVaDmdCm+Sh6MB3+
t9LaZFhhYBhD1+ajzNVYJyFuaIJiI1XQCIWbQ65eUzILoes7lCbuGKDCa3NdcCRz
MtZA2hknTSJyfewQq+nUxvHqtZmx70BdO3TTmhD/yuQmcUUyGnHEWL4SHEaih5i0
5HRGCky7LQ8tYOAslpxPcIdICGsEeCtHOg4ItCyenTgDO63lhG9tBFQMhWsWTA/q
LOs+yo53L4QEiniSxmIdjFfXZJzOfF6LPelQC16souTjmNlClcI=
=VabO
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: