From owner-freebsd-questions@FreeBSD.ORG Fri Feb 20 08:29:02 2015 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id ED36B32C for ; Fri, 20 Feb 2015 08:29:01 +0000 (UTC) Received: from mail-wi0-x232.google.com (mail-wi0-x232.google.com [IPv6:2a00:1450:400c:c05::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client CN "smtp.gmail.com", Issuer "Google Internet Authority G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 79AD468B for ; Fri, 20 Feb 2015 08:29:01 +0000 (UTC) Received: by mail-wi0-f178.google.com with SMTP id em10so1241308wid.5 for ; Fri, 20 Feb 2015 00:29:00 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=message-id:date:from:user-agent:mime-version:to:cc:subject :references:in-reply-to:content-type:content-transfer-encoding; bh=k1dGkOIr1LZ+XwzHmBw7WIrhvBgyNfou78FyLj0SN7U=; b=gWFsZaV9LJgKGD7q9jXxT3LMWSx8yokENhn2vgZL51OVWeMEiy8iTaA8vs/vzlie6K AH19+QlkUjrQXyWarLTGk+5XKUMyW/v9ujlG3vH/C/JPHYnnIed/4xZUydTB72C8WcEP dt+PEFephQvuYM6rUFZ20449D7Z2eN89bFEd6fV+Q13KAH+e77uZ8uQ1hK2JU58t7Y1s 5gnG9z7ku7i1u8/v+FZ9rCFHPce2VUbvoh7pGR8bSrjaJH78idCCY17MsUF0uzV7aQAi Yh4LyDA5XE52+CsJjC4XASVuPk5ZVfxe8Bvn3Y/Q6NI9phbDlZKdkvOJExpsUKId0rY4 h2PQ== X-Received: by 10.180.207.6 with SMTP id ls6mr3530596wic.13.1424420939912; Fri, 20 Feb 2015 00:28:59 -0800 (PST) Received: from [192.168.1.145] (static-228-200-167-83.thenetworkfactory.nl. [83.167.200.228]) by mx.google.com with ESMTPSA id qb8sm34863583wjc.4.2015.02.20.00.28.59 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 20 Feb 2015 00:28:59 -0800 (PST) Message-ID: <54E6F04A.5080409@gmail.com> Date: Fri, 20 Feb 2015 09:28:58 +0100 From: Johan Hendriks User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.4.0 MIME-Version: 1.0 To: joh.hendriks@gmail.com Subject: Re: What's the latest release from freebsd-update? References: <54E6B8B9.1060204@hiwaay.net> In-Reply-To: <54E6B8B9.1060204@hiwaay.net> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit Cc: freebsd-questions@freebsd.org X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 20 Feb 2015 08:29:02 -0000 Op 20-02-15 om 05:31 schreef William A. Mahaffey III: > On 02/19/15 08:34, Dan Langille wrote: >> I want to write a check to let us know if a given server is on the >> latest >> version. >> >> For example, how can I determine that FreeBSD 9.3-RELEASE-p5 is the >> latest >> and greatest? >> >> I could run freebsd-update and see what comes back, but that's not ideal >> for a Nagios check. >> >> This output seems promising: >> >> $ sysctl kern.version >> kern.version: FreeBSD 9.3-RELEASE-p5 #0: Mon Nov 3 22:38:58 UTC 2014 >> root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC >> >> Let's assume we use that as the check for the host. >> >> What do we compare it to? Where can I find out that 9.3-RELEASE-p6 is >> available? > > > I'm running 9.3 (FreeBSD 9.3-RELEASE-p5) as well, & I have noticed > posts going by onlist referencing 9.3-RELEASE-p9 (I think, might have > been 8), although that is little help to you. You & I are several > months back from today, probably safe to assume something newer is > available. The bottom of > https://www.freebsd.org/doc/handbook/updating-upgrading-freebsdupdate.html > talks about comparing system versions. If you do a 'freebsd-update > fetch' followed by a 'freebsd-update install' you will be updated to > the latest & greatest patch level, but I'm not sure there is a way of > checking that level apriori .... $0.02, no more, no less .... > Go to the website www.freebsd.org, on the right site there is a colum security advisories click on the latest, and it will show you the latest patch level of all versions. Like the example below, the advisory for sctp. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 ============================================================================= FreeBSD-SA-15:03.sctp Security Advisory The FreeBSD Project Topic: SCTP stream reset vulnerability Category: core Module: sctp Announced: 2015-01-27 Credits: Gerasimos Dimitriadis Affects: All supported versions of FreeBSD. Corrected: 2015-01-27 19:36:08 UTC (stable/10, 10.1-STABLE) 2015-01-27 19:37:02 UTC (releng/10.1, 10.1-RELEASE-p5) 2015-01-27 19:37:02 UTC (releng/10.0, 10.0-RELEASE-p17) 2015-01-27 19:36:08 UTC (stable/9, 9.3-STABLE) 2015-01-27 19:37:02 UTC (releng/9.3, 9.3-RELEASE-p9) 2015-01-27 19:36:08 UTC (stable/8, 8.4-STABLE) 2015-01-27 19:37:02 UTC (releng/8.4, 8.4-RELEASE-p23) CVE Name: CVE-2014-8613