Open security access protocols

Edit Package openscap

OpenSCAP is a set of open source libraries providing an easier path for integration of the SCAP line of standards.

SCAP is a line of standards managed by NIST with the goal of providing a standard language for the expression of Computer Network Defense related information.

More information about SCAP can be found at nvd.nist.gov.

Refresh
Refresh
Source Files
Filename Size Changed
0001-Do-not-use-C-keyword-operator-as-a-function-paramete.patch 0000002020 1.97 KB
1.3.2.tar.gz 0012360113 11.8 MB
_service 0000000476 476 Bytes
openscap-new-suse.patch 0000007034 6.87 KB
openscap-rpmlintrc 0000000208 208 Bytes
openscap.changes 0000045185 44.1 KB
openscap.spec 0000009379 9.16 KB
oscap-scan.service 0000000228 228 Bytes
oscap-scan.sh 0000000523 523 Bytes
scap-yast2sec-oval.xml 0000039063 38.1 KB
scap-yast2sec-xccdf.xml 0000017766 17.3 KB
sysconfig.oscap-scan 0000000407 407 Bytes
Latest Revision
Gustavo Yokoyama Ribeiro's avatar Gustavo Yokoyama Ribeiro (gyribeiro) committed (revision 2)
- Add upstream patch to fix the scap-workbench build:
  * 0001-Do-not-use-C-keyword-operator-as-a-function-paramete.patch

- switch back to official release
- openscap 1.3.2
  - the test suite and build scripts were improved to support Debian 10
  - offline mode has received some love with a set of dedicated tests and various fixes in OVAL probes;
  - the oscap-docker wrapper is no longer dependent on Atomic 
  - Python binding are now more robust 
  - HTML reports and guides, generated by the scanner, are now more accessible for non-visual rendering agents 
  - Support of multi-check rules has been improved across the whole workflow 
  There are other changes as well, here is the list:
  * New features
    - Offline mode support for environmentvariable58 probe
    - The oscap-docker wrapper is available without Atomic
  + Maintenance, bug fixes
    - Improved support of multi-check rules (report, remediations, console output)
    - Improved HTML report look and feel, including printed version
    - Less clutter in verbose mode output; some warnings and errors demoted to verbose mode levels
    - Probe rpmverifyfile uses and returns canonical paths
    - Improved a11y of HTML reports and guides
    - Fixes and improvements for SWIG Python bindings
    - #1403 fixed: Scanner would not apply remediation for multicheck rules (verbosity)
    - Fixed URL link mechanism for Red Hat Errata
    - New STIG Viewer URI: public.cyber.mil
    - Probe selinuxsecuritycontext would not check if SELinux is enabled
    - Scanner would provide information about unsupported OVAL objects
    - Added more tests for offline mode (probes, remediation)
    - #528 fixed: Eval SCE script when /tmp is in mode noexec
    - #1173, RHBZ#1603347 fixed: Double chdir/chroot in probe rpmverifypackage
Comments 0
openSUSE Build Service is sponsored by