What's the latest release from freebsd-update?

Dan Langille dlangille at sourcefire.com
Tue Feb 24 16:41:55 UTC 2015


I think that none of these suggestions, while useful, are easily programmed
into a Nagios check (for example).

On Fri, Feb 20, 2015 at 3:28 AM, Johan Hendriks <joh.hendriks at gmail.com>
wrote:

>
> Op 20-02-15 om 05:31 schreef William A. Mahaffey III:
>
>  On 02/19/15 08:34, Dan Langille wrote:
>>
>>> I want to write a check to let us know if a given server is on the
>>> latest
>>> version.
>>>
>>> For example, how can I determine that FreeBSD 9.3-RELEASE-p5 is the
>>> latest
>>> and greatest?
>>>
>>> I could run freebsd-update and see what comes back, but that's not ideal
>>> for a Nagios check.
>>>
>>> This output seems promising:
>>>
>>> $ sysctl kern.version
>>> kern.version: FreeBSD 9.3-RELEASE-p5 #0: Mon Nov  3 22:38:58 UTC 2014
>>> root at amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC
>>>
>>> Let's assume we use that as the check for the host.
>>>
>>> What do we compare it to?  Where can I find out that 9.3-RELEASE-p6 is
>>> available?
>>>
>>
>>
>> I'm running 9.3 (FreeBSD 9.3-RELEASE-p5) as well, & I have noticed
>> posts going by onlist referencing 9.3-RELEASE-p9 (I think, might have
>> been 8), although that is little help to you. You & I are several
>> months back from today, probably safe to assume something newer is
>> available. The bottom of
>> https://www.freebsd.org/doc/handbook/updating-upgrading-
>> freebsdupdate.html
>> talks about comparing system versions.  If you do a 'freebsd-update
>> fetch' followed by a 'freebsd-update install' you will be updated to
>> the latest & greatest patch level, but I'm not sure there is a way of
>> checking that level apriori .... $0.02, no more, no less ....
>>
>>
> Go to the website www.freebsd.org, on the right site there is a colum
> security advisories
>
> click on the latest, and it will show you the latest patch level of all
> versions. Like the example below,  the advisory for sctp.
>
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
> ============================================================
> =================
> FreeBSD-SA-15:03.sctp                                       Security
> Advisory
>                                                           The FreeBSD
> Project
>
> Topic:          SCTP stream reset vulnerability
>
> Category:       core
> Module:         sctp
> Announced:      2015-01-27
> Credits:        Gerasimos Dimitriadis
> Affects:        All supported versions of FreeBSD.
> Corrected:      2015-01-27 19:36:08 UTC (stable/10, 10.1-STABLE)
>                 2015-01-27 19:37:02 UTC (releng/10.1, 10.1-RELEASE-p5)
>                 2015-01-27 19:37:02 UTC (releng/10.0, 10.0-RELEASE-p17)
>                 2015-01-27 19:36:08 UTC (stable/9, 9.3-STABLE)
>                 2015-01-27 19:37:02 UTC (releng/9.3, 9.3-RELEASE-p9)
>                 2015-01-27 19:36:08 UTC (stable/8, 8.4-STABLE)
>                 2015-01-27 19:37:02 UTC (releng/8.4, 8.4-RELEASE-p23)
> CVE Name:       CVE-2014-8613
>
>
>
> _______________________________________________
> freebsd-questions at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-questions
> To unsubscribe, send any mail to "freebsd-questions-
> unsubscribe at freebsd.org"
>



-- 
Dan Langille
Infrastructure & Operations
Talos Group
Sourcefire, Inc.


More information about the freebsd-questions mailing list