While there are exceptions, generally stable releases of Linux distros backport important security fixes rather than packaging new upstream versions. They do this because the new upstream versions usually contain unrelated changes and every additional change brings more risk of regressions.
Unfortunately in most cases (again there are exceptions), the output of "program --version
" only indicates the upstream version, not the distro-specific revisions. So it is not generally a good indication of whether a security fix has been applied.
Generally security fixes will be listed in the package's changelog which can be found at /usr/share/doc/<package>/changelog.Debian.gz
. You can also check the installed version of the package against Debian's security tracker.
Debian addressed CVE-2021-3156 in version 1.8.27-1+deb10u3 and that quickly filtered its way down to Raspbian. There have however been some more minor issues raised since then that Debian has not seen fit to issue a security update for.
--version
when these updates have been made. I personally don't make a habit of monitoring and following up on CVEs, rather I assume Debian (and eventually RPi OS) will deal with it. But this one appeared on my radar, and I tracked it. It's a good reminder for me on taking the hard work of so many for granted! – Seamus Mar 08 '21 at 20:14