How to Install and Uninstall govulncheck Package on openSuSE Tumbleweed
Last updated: November 27,2024
1. Install "govulncheck" package
In this section, we are going to explain the necessary steps to install govulncheck on openSuSE Tumbleweed
$
sudo zypper refresh
Copied
$
sudo zypper install
govulncheck
Copied
2. Uninstall "govulncheck" package
Please follow the instructions below to uninstall govulncheck on openSuSE Tumbleweed:
$
sudo zypper remove
govulncheck
Copied
3. Information about the govulncheck package on openSuSE Tumbleweed
Information for package govulncheck:
------------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : govulncheck
Version : 1.0.4-1.1
Arch : x86_64
Vendor : openSUSE
Installed Size : 8.8 MiB
Installed : No
Status : not installed
Source package : govulncheck-1.0.4-1.1.src
Upstream URL : https://github.com/golang/vuln
Summary : CLI tool to report known CVE vulnerabilities in Go source code and binaries
Description :
govulncheck is a CLI tool to report known vulnerabilities that affect Go code. It uses static analysis of source code or a binary's symbol table to narrow down reports to only those that could affect the application.
By default, govulncheck makes requests to the Go vulnerability database at https://vuln.go.dev. Requests to the vulnerability database contain only module paths, not code or other properties of your program. See https://vuln.go.dev/privacy.html for more. Use the -db flag to specify a different database, which must implement the specification at https://go.dev/security/vuln/database.
------------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : govulncheck
Version : 1.0.4-1.1
Arch : x86_64
Vendor : openSUSE
Installed Size : 8.8 MiB
Installed : No
Status : not installed
Source package : govulncheck-1.0.4-1.1.src
Upstream URL : https://github.com/golang/vuln
Summary : CLI tool to report known CVE vulnerabilities in Go source code and binaries
Description :
govulncheck is a CLI tool to report known vulnerabilities that affect Go code. It uses static analysis of source code or a binary's symbol table to narrow down reports to only those that could affect the application.
By default, govulncheck makes requests to the Go vulnerability database at https://vuln.go.dev. Requests to the vulnerability database contain only module paths, not code or other properties of your program. See https://vuln.go.dev/privacy.html for more. Use the -db flag to specify a different database, which must implement the specification at https://go.dev/security/vuln/database.