I got some really helpful comments on my recent post
Scan Linux for Vulnerable Packages. The suggestions on how to do it on Debian and Redhat made me wonder: which distributions provide tools and what are they capable of? So the goal is to check wether each distribution has a way to automatically check for vulnerable packages that need upgrades.
Below you find an overview of the tools I've found and the distributions that might not have a good solution yet.
Distribution |
Scanner |
Rating |
Description |
Debian |
debsecan |
superb |
Easy to use. Maintained by the Debian testing team. Lists packages, CVE numbers and details. |
Ubuntu |
debsecan |
useless |
They just packaged the Debian scanner without providing a database for it!
And since 2008 there is a bug about it being 100% useless. |
CentOS
Fedora
Redhat |
"yum list-security" |
good |
Provides package name and CVE number. Note: On older systems there is only "yum list updates". |
OpenSuSE |
"zypper list-patches" |
ok |
Provides packages names with security relevant updates. You need to filter the list yourself or use the "--cve" switch to limit to CVEs only. |
SLES |
"rug lu" |
ok |
Provides packages names with security relevant updates. Similar to zypper you need to do the filtering yourself. |
Gentoo |
glsa-check |
bad |
There is a dedicated scanner, but no documentation. |
FreeBSD |
Portaudit |
superb |
No Linux? Still a nice solution... Lists vulnerable ports and vulnerability details. |
I know I didn't cover all Linux distributions and I rely on your comments for details I've missed.
Ubuntu doesn't look good here, but maybe there will be some solution one day :-)