Thanks for the info, this solves the issue.
I probably have been looking in the wrong direction.


-----Original Message-----
From: Darac Marjal [mailto:mailingl...@darac.org.uk] 
Sent: donderdag 22 november 2012 15:51
To: debian-user@lists.debian.org
Subject: Re: Debian Package Version system

On Thu, Nov 22, 2012 at 09:54:22AM +0100, Arnoud Tijssen wrote:
> Hi All,
> 
> After performing some vulnerability scans on some our systems one of the 
> outcomes was that some software packages were out of date.
> We`re using the package management system of Debian and all packages were 
> updated (apt-get update & apt-get (dist-)upgrade) prior to the scan.
> The vulnerability scanner most likely compares the version against that of 
> the source code, which differs.
> How can I tell which version in the debian package repository system 
> corresponds to which version of the source code.

http://www.debian.org/doc/debian-policy/ch-controlfields.html#s-f-Version
states that a debian package has a version number that is formatted as:
  [epoch:]upstream_version[-debian_revision]

That is, a small integer (0, if unspecified) followed by a colon, then the 
upstream version, then (starting from the last hyphen) the debian revision 
(again 0 if unspecified).

So, taking some examples from my system:
 bash:          4.1-3                           -> Upstream: 4.1
 acpid:         1:2.0.7-1squeeze4       -> Upstream: 2.0.7
 etckeeper: 0.48                                -> Upstream: 0.48

> That way I can whitelist these software packages in our vulnerability scans.

You might want to consider WHY the software was updated. Is there a newer 
upstream because there's a security vulnerability, or is it just new features 
(possibly untested).


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/e7e899956e6065488dbc6623f76f36a275bf5a6...@ramnl-ex02.ram.nl

Reply via email to