Re: Tracking base system and kernel updates/vulnerabilities
On Apr 15, 2008, at 20:28 , Lowell Gilbert wrote: Anselm Strauss [EMAIL PROTECTED] writes: is there a tool, like portaudit for the ports tree, to track updates and/or vulnerabilities for the base system and the kernel? What I'm looking for is a tool that will check my current installation against a specific checkout of the CVS source and kernel trees considering a specific CVS tag and inform me where my system is outdated and vulnerable. I don't know if this is even possible by just having the CVS trees ... For the kernel, is there something like a linear version number in the -STABLE branches? I noticed there's a pX in the kernel version for release kernels. How do I for example compare the currentness of two 7.0-STABLE kernels if I don't know from what source they were build? freebsd-update(8) Yep, that's exactly what I was looking for (must have overlooked it). Had some trouble until I noticed it will only work if the running kernel has a -RELEASE tag in it's uname, but now I also see how this works with the patch version. I have 2 small questions left: - Can I somehow determine the version of the base system without running uname on the kernel (I could have a release base system but run a stable kernel for example)? Sure, I could take the indirect way over freebsd-update again, but is there some sort of version information stored in the base system? - Is there some list of all possible components in the base system? So far I've seen src, kernel and world. Are there more? Thanks, Anselm ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: Tracking base system and kernel updates/vulnerabilities
On Thu, Apr 17, 2008 at 08:20:00AM +0200, Anselm Strauss wrote: [...] - Can I somehow determine the version of the base system without running uname on the kernel (I could have a release base system but run a stable kernel for example)? Sure, I could take the indirect way over freebsd-update again, but is there some sort of version information stored in the base system? Not really. Incidentally, running a userland out-of-sync with the kernel is asking for Bad-Things(tm) to happen. -- Jonathan Chen [EMAIL PROTECTED] --- One, with God, is always a majority, but many a martyr has been burned at the stake while the votes were being counted. -- Thomas B. Reed ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: Tracking base system and kernel updates/vulnerabilities
Jonathan Chen writes: Incidentally, running a userland out-of-sync with the kernel is asking for Bad-Things(tm) to happen. I think of it more like sacrificing a room full of kindergardeners to your oozing tentacled god Asking for Bad Things to Happen(tm). Robert Huff ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to [EMAIL PROTECTED]
Tracking base system and kernel updates/vulnerabilities
Hi, is there a tool, like portaudit for the ports tree, to track updates and/or vulnerabilities for the base system and the kernel? What I'm looking for is a tool that will check my current installation against a specific checkout of the CVS source and kernel trees considering a specific CVS tag and inform me where my system is outdated and vulnerable. I don't know if this is even possible by just having the CVS trees ... For the kernel, is there something like a linear version number in the -STABLE branches? I noticed there's a pX in the kernel version for release kernels. How do I for example compare the currentness of two 7.0-STABLE kernels if I don't know from what source they were build? Cheers, Anselm ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to [EMAIL PROTECTED]
Re: Tracking base system and kernel updates/vulnerabilities
Anselm Strauss [EMAIL PROTECTED] writes: is there a tool, like portaudit for the ports tree, to track updates and/or vulnerabilities for the base system and the kernel? What I'm looking for is a tool that will check my current installation against a specific checkout of the CVS source and kernel trees considering a specific CVS tag and inform me where my system is outdated and vulnerable. I don't know if this is even possible by just having the CVS trees ... For the kernel, is there something like a linear version number in the -STABLE branches? I noticed there's a pX in the kernel version for release kernels. How do I for example compare the currentness of two 7.0-STABLE kernels if I don't know from what source they were build? freebsd-update(8) ___ freebsd-questions@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-questions To unsubscribe, send any mail to [EMAIL PROTECTED]