Date: Tue, 24 Feb 2015 08:56:30 -0500 From: Dan Langille <dlangille@sourcefire.com> To: Johan Hendriks <joh.hendriks@gmail.com> Cc: freebsd-questions@freebsd.org Subject: Re: What's the latest release from freebsd-update? Message-ID: <CABU7Bdfsct-vUE2dMGUWSj8Kp3H20CNfK3U9w3mfH_tyq3vipw@mail.gmail.com> In-Reply-To: <54E6F04A.5080409@gmail.com> References: <CABU7BdejfOXh_yhao3=EfSPbk=qFQ08ZBs-iEGSNTBJ47i9RGw@mail.gmail.com> <54E6B8B9.1060204@hiwaay.net> <54E6F04A.5080409@gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
I think that none of these suggestions, while useful, are easily programmed into a Nagios check (for example). On Fri, Feb 20, 2015 at 3:28 AM, Johan Hendriks <joh.hendriks@gmail.com> wrote: > > Op 20-02-15 om 05:31 schreef William A. Mahaffey III: > > On 02/19/15 08:34, Dan Langille wrote: >> >>> I want to write a check to let us know if a given server is on the >>> latest >>> version. >>> >>> For example, how can I determine that FreeBSD 9.3-RELEASE-p5 is the >>> latest >>> and greatest? >>> >>> I could run freebsd-update and see what comes back, but that's not ideal >>> for a Nagios check. >>> >>> This output seems promising: >>> >>> $ sysctl kern.version >>> kern.version: FreeBSD 9.3-RELEASE-p5 #0: Mon Nov 3 22:38:58 UTC 2014 >>> root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC >>> >>> Let's assume we use that as the check for the host. >>> >>> What do we compare it to? Where can I find out that 9.3-RELEASE-p6 is >>> available? >>> >> >> >> I'm running 9.3 (FreeBSD 9.3-RELEASE-p5) as well, & I have noticed >> posts going by onlist referencing 9.3-RELEASE-p9 (I think, might have >> been 8), although that is little help to you. You & I are several >> months back from today, probably safe to assume something newer is >> available. The bottom of >> https://www.freebsd.org/doc/handbook/updating-upgrading- >> freebsdupdate.html >> talks about comparing system versions. If you do a 'freebsd-update >> fetch' followed by a 'freebsd-update install' you will be updated to >> the latest & greatest patch level, but I'm not sure there is a way of >> checking that level apriori .... $0.02, no more, no less .... >> >> > Go to the website www.freebsd.org, on the right site there is a colum > security advisories > > click on the latest, and it will show you the latest patch level of all > versions. Like the example below, the advisory for sctp. > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > ============================================================ > ================= > FreeBSD-SA-15:03.sctp Security > Advisory > The FreeBSD > Project > > Topic: SCTP stream reset vulnerability > > Category: core > Module: sctp > Announced: 2015-01-27 > Credits: Gerasimos Dimitriadis > Affects: All supported versions of FreeBSD. > Corrected: 2015-01-27 19:36:08 UTC (stable/10, 10.1-STABLE) > 2015-01-27 19:37:02 UTC (releng/10.1, 10.1-RELEASE-p5) > 2015-01-27 19:37:02 UTC (releng/10.0, 10.0-RELEASE-p17) > 2015-01-27 19:36:08 UTC (stable/9, 9.3-STABLE) > 2015-01-27 19:37:02 UTC (releng/9.3, 9.3-RELEASE-p9) > 2015-01-27 19:36:08 UTC (stable/8, 8.4-STABLE) > 2015-01-27 19:37:02 UTC (releng/8.4, 8.4-RELEASE-p23) > CVE Name: CVE-2014-8613 > > > > _______________________________________________ > freebsd-questions@freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-questions > To unsubscribe, send any mail to "freebsd-questions- > unsubscribe@freebsd.org" > -- Dan Langille Infrastructure & Operations Talos Group Sourcefire, Inc.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CABU7Bdfsct-vUE2dMGUWSj8Kp3H20CNfK3U9w3mfH_tyq3vipw>