From owner-freebsd-questions@FreeBSD.ORG Tue Feb 24 16:56:14 2015 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 65A58D29 for ; Tue, 24 Feb 2015 16:56:14 +0000 (UTC) Received: from mail-la0-f52.google.com (mail-la0-f52.google.com [209.85.215.52]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id D93306A9 for ; Tue, 24 Feb 2015 16:56:13 +0000 (UTC) Received: by labhv19 with SMTP id hv19so4403419lab.10 for ; Tue, 24 Feb 2015 08:56:06 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:date :message-id:subject:from:to:content-type; bh=bNDbyTcVpk32ERgXdHblgOuIjEEjco3yUq2YocqIgM8=; b=HTRfv3J1GTcJSOFBt9U3LAt4O30UGlygPAid00S7wKK9B7l2z961JNGMQsUWECNihT kTJ27QoUHCeO8UTXvwtDxO0kK2VTh4vAcRcDzcD0/69yfyrXEgAvOpjhLW5Yk8TGEMrH 0yq3jBMmmMBBnsjub9syFDLGt45mc+ec4s4sYyPT1kFsVq3iVr3hhytuhIIRQUAlSACa ANrp9zVJDrekvm86gzuSHqkYPLC/4Ig0RDLxDFq4t3/u9Y2LbLX4nXZJnDqU0CQCMoPo JDXBerS8mR0EUhzorxajdS1HSktr69Fv8rLrDKqP0/jP8bVBBxKUpWKYX8j3XXXa8PDX /yTA== X-Gm-Message-State: ALoCoQkKjlIdiqHVexm68FOeLzG9mETqRi/rx7ZY6T3HjvqMAag3ws0iLNXFT6B5dT44BkwjbL6d MIME-Version: 1.0 X-Received: by 10.152.43.228 with SMTP id z4mr14902685lal.111.1424796966360; Tue, 24 Feb 2015 08:56:06 -0800 (PST) Received: by 10.152.8.170 with HTTP; Tue, 24 Feb 2015 08:56:06 -0800 (PST) X-Originating-IP: [76.252.236.89] Received: by 10.152.8.170 with HTTP; Tue, 24 Feb 2015 08:56:06 -0800 (PST) In-Reply-To: References: <54E6B8B9.1060204@hiwaay.net> <54E6F04A.5080409@gmail.com> Date: Tue, 24 Feb 2015 08:56:06 -0800 Message-ID: Subject: Re: What's the latest release from freebsd-update? From: "Brian W." To: FreeBSD Mailing List Content-Type: text/plain; charset=UTF-8 X-Content-Filtered-By: Mailman/MimeDel 2.1.18-1 X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 24 Feb 2015 16:56:14 -0000 I haven't used Nagios much but can't a freebsd-update fetch be run and then the contents of /var/db/freebsd-update/ examined? If updates are ready to be installed there will be stuff there. On Feb 24, 2015 8:42 AM, "Dan Langille" wrote: > I think that none of these suggestions, while useful, are easily programmed > into a Nagios check (for example). > > On Fri, Feb 20, 2015 at 3:28 AM, Johan Hendriks > wrote: > > > > > Op 20-02-15 om 05:31 schreef William A. Mahaffey III: > > > > On 02/19/15 08:34, Dan Langille wrote: > >> > >>> I want to write a check to let us know if a given server is on the > >>> latest > >>> version. > >>> > >>> For example, how can I determine that FreeBSD 9.3-RELEASE-p5 is the > >>> latest > >>> and greatest? > >>> > >>> I could run freebsd-update and see what comes back, but that's not > ideal > >>> for a Nagios check. > >>> > >>> This output seems promising: > >>> > >>> $ sysctl kern.version > >>> kern.version: FreeBSD 9.3-RELEASE-p5 #0: Mon Nov 3 22:38:58 UTC 2014 > >>> root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC > >>> > >>> Let's assume we use that as the check for the host. > >>> > >>> What do we compare it to? Where can I find out that 9.3-RELEASE-p6 is > >>> available? > >>> > >> > >> > >> I'm running 9.3 (FreeBSD 9.3-RELEASE-p5) as well, & I have noticed > >> posts going by onlist referencing 9.3-RELEASE-p9 (I think, might have > >> been 8), although that is little help to you. You & I are several > >> months back from today, probably safe to assume something newer is > >> available. The bottom of > >> https://www.freebsd.org/doc/handbook/updating-upgrading- > >> freebsdupdate.html > >> talks about comparing system versions. If you do a 'freebsd-update > >> fetch' followed by a 'freebsd-update install' you will be updated to > >> the latest & greatest patch level, but I'm not sure there is a way of > >> checking that level apriori .... $0.02, no more, no less .... > >> > >> > > Go to the website www.freebsd.org, on the right site there is a colum > > security advisories > > > > click on the latest, and it will show you the latest patch level of all > > versions. Like the example below, the advisory for sctp. > > > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA512 > > > > ============================================================ > > ================= > > FreeBSD-SA-15:03.sctp Security > > Advisory > > The FreeBSD > > Project > > > > Topic: SCTP stream reset vulnerability > > > > Category: core > > Module: sctp > > Announced: 2015-01-27 > > Credits: Gerasimos Dimitriadis > > Affects: All supported versions of FreeBSD. > > Corrected: 2015-01-27 19:36:08 UTC (stable/10, 10.1-STABLE) > > 2015-01-27 19:37:02 UTC (releng/10.1, 10.1-RELEASE-p5) > > 2015-01-27 19:37:02 UTC (releng/10.0, 10.0-RELEASE-p17) > > 2015-01-27 19:36:08 UTC (stable/9, 9.3-STABLE) > > 2015-01-27 19:37:02 UTC (releng/9.3, 9.3-RELEASE-p9) > > 2015-01-27 19:36:08 UTC (stable/8, 8.4-STABLE) > > 2015-01-27 19:37:02 UTC (releng/8.4, 8.4-RELEASE-p23) > > CVE Name: CVE-2014-8613 > > > > > > > > _______________________________________________ > > freebsd-questions@freebsd.org mailing list > > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > > To unsubscribe, send any mail to "freebsd-questions- > > unsubscribe@freebsd.org" > > > > > > -- > Dan Langille > Infrastructure & Operations > Talos Group > Sourcefire, Inc. > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to " > freebsd-questions-unsubscribe@freebsd.org" >