Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 12 Oct 2005 00:12:35 -0700 (PDT)
From:      Arne "Wörner" <arne_woerner@yahoo.com>
To:        Colin Percival <cperciva@freebsd.org>
Cc:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-05:21.openssl
Message-ID:  <20051012071235.32916.qmail@web30302.mail.mud.yahoo.com>
In-Reply-To: <434C5B02.8030904@freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help

--- Colin Percival <cperciva@freebsd.org> wrote:
> Andrea Venturoli wrote:
> > FreeBSD Security Advisories wrote:
> >> Note that any statically linked applications that are not
> part of the
> >> base system (i.e. from the Ports Collection or other
> 3rd-party sources)
> >> must be recompiled.
> > 
> > Ok, is there any way to list installed ports which are
> statically linked
> > against OpenSSL?
> 
> There isn't any particularly good approach, unfortunately.  I
> think I'd
> probably use a combination of find(1), file(1), and fgrep(1) to
> find any
> executable files (via find) which are statically linked (using
> file) and
> which contain the string "OpenSSL" (using fgrep).
>
I would use a combination out of nm(1) and grep(1) instead of
fgrep(1). But I do not now right now, which symbol will always be
contained in a statically linked executable that might use
OpenSSL...

Btw: Why should the string "OpenSSL" be contained in each and
every executable, that might use OpenSSL?

-Arne



	
		
__________________________________ 
Yahoo! Mail - PC Magazine Editors' Choice 2005 
http://mail.yahoo.com



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20051012071235.32916.qmail>