This is not a great experience for anyone. If we had customers running their own security solutions, we'd have to explain that it's flagging it because Veeam won't use SemVer and don't think it's important to put the patch number into the correct part of the registry so EVERYTHING knows what version of their product is installed and if it's vulnerable etc. That's not going to make Veeam look good.
Even if you won't switch to plain SemVer, PLEASE can you write the WHOLE version string to
Code: Select all
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{GUID-HERE}]
"DisplayVersion"="a.b.c.d Pyyyymmdd"
Code: Select all
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{GUID-HERE}]
"DisplayVersion"="a.b.c.d.yyyymmdd"
So other software can consume the exact version number, and amongst other things correctly determine if the software has a known security vulnerability in it?
Thanks