Date: Fri, 20 Feb 2015 09:28:58 +0100 From: Johan Hendriks <joh.hendriks@gmail.com> To: joh.hendriks@gmail.com Cc: freebsd-questions@freebsd.org Subject: Re: What's the latest release from freebsd-update? Message-ID: <54E6F04A.5080409@gmail.com> In-Reply-To: <54E6B8B9.1060204@hiwaay.net> References: <CABU7BdejfOXh_yhao3=EfSPbk=qFQ08ZBs-iEGSNTBJ47i9RGw@mail.gmail.com> <54E6B8B9.1060204@hiwaay.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Op 20-02-15 om 05:31 schreef William A. Mahaffey III: > On 02/19/15 08:34, Dan Langille wrote: >> I want to write a check to let us know if a given server is on the >> latest >> version. >> >> For example, how can I determine that FreeBSD 9.3-RELEASE-p5 is the >> latest >> and greatest? >> >> I could run freebsd-update and see what comes back, but that's not ideal >> for a Nagios check. >> >> This output seems promising: >> >> $ sysctl kern.version >> kern.version: FreeBSD 9.3-RELEASE-p5 #0: Mon Nov 3 22:38:58 UTC 2014 >> root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC >> >> Let's assume we use that as the check for the host. >> >> What do we compare it to? Where can I find out that 9.3-RELEASE-p6 is >> available? > > > I'm running 9.3 (FreeBSD 9.3-RELEASE-p5) as well, & I have noticed > posts going by onlist referencing 9.3-RELEASE-p9 (I think, might have > been 8), although that is little help to you. You & I are several > months back from today, probably safe to assume something newer is > available. The bottom of > https://www.freebsd.org/doc/handbook/updating-upgrading-freebsdupdate.html > talks about comparing system versions. If you do a 'freebsd-update > fetch' followed by a 'freebsd-update install' you will be updated to > the latest & greatest patch level, but I'm not sure there is a way of > checking that level apriori .... $0.02, no more, no less .... > Go to the website www.freebsd.org, on the right site there is a colum security advisories click on the latest, and it will show you the latest patch level of all versions. Like the example below, the advisory for sctp. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-15:03.sctp Security Advisory The FreeBSD Project Topic: SCTP stream reset vulnerability Category: core Module: sctp Announced: 2015-01-27 Credits: Gerasimos Dimitriadis Affects: All supported versions of FreeBSD. Corrected: 2015-01-27 19:36:08 UTC (stable/10, 10.1-STABLE) 2015-01-27 19:37:02 UTC (releng/10.1, 10.1-RELEASE-p5) 2015-01-27 19:37:02 UTC (releng/10.0, 10.0-RELEASE-p17) 2015-01-27 19:36:08 UTC (stable/9, 9.3-STABLE) 2015-01-27 19:37:02 UTC (releng/9.3, 9.3-RELEASE-p9) 2015-01-27 19:36:08 UTC (stable/8, 8.4-STABLE) 2015-01-27 19:37:02 UTC (releng/8.4, 8.4-RELEASE-p23) CVE Name: CVE-2014-8613
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?54E6F04A.5080409>