How to Install and Uninstall govulncheck Package on openSUSE Leap
Last updated: December 24,2024
1. Install "govulncheck" package
Please follow the guidance below to install govulncheck on openSUSE Leap
$
sudo zypper refresh
Copied
$
sudo zypper install
govulncheck
Copied
2. Uninstall "govulncheck" package
Please follow the guidelines below to uninstall govulncheck on openSUSE Leap:
$
sudo zypper remove
govulncheck
Copied
3. Information about the govulncheck package on openSUSE Leap
Information for package govulncheck:
------------------------------------
Repository : Update repository of openSUSE Backports
Name : govulncheck
Version : 1.0.1-bp155.2.1
Arch : x86_64
Vendor : openSUSE
Installed Size : 9.5 MiB
Installed : No
Status : not installed
Source package : govulncheck-1.0.1-bp155.2.1.src
Upstream URL : https://github.com/golang/vuln
Summary : CLI tool to report known CVE vulnerabilities in Go source code and binaries
Description :
govulncheck is a CLI tool to report known vulnerabilities that affect Go code. It uses static analysis of source code or a binary's symbol table to narrow down reports to only those that could affect the application.
By default, govulncheck makes requests to the Go vulnerability database at https://vuln.go.dev. Requests to the vulnerability database contain only module paths, not code or other properties of your program. See https://vuln.go.dev/privacy.html for more. Use the -db flag to specify a different database, which must implement the specification at https://go.dev/security/vuln/database.
------------------------------------
Repository : Update repository of openSUSE Backports
Name : govulncheck
Version : 1.0.1-bp155.2.1
Arch : x86_64
Vendor : openSUSE
Installed Size : 9.5 MiB
Installed : No
Status : not installed
Source package : govulncheck-1.0.1-bp155.2.1.src
Upstream URL : https://github.com/golang/vuln
Summary : CLI tool to report known CVE vulnerabilities in Go source code and binaries
Description :
govulncheck is a CLI tool to report known vulnerabilities that affect Go code. It uses static analysis of source code or a binary's symbol table to narrow down reports to only those that could affect the application.
By default, govulncheck makes requests to the Go vulnerability database at https://vuln.go.dev. Requests to the vulnerability database contain only module paths, not code or other properties of your program. See https://vuln.go.dev/privacy.html for more. Use the -db flag to specify a different database, which must implement the specification at https://go.dev/security/vuln/database.