Date: Mon, 4 Aug 2003 10:10:52 +0100 From: Chris Howells <lists@chrishowells.co.uk> To: security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-03:08.realpath Message-ID: <200308041010.52904.lists@chrishowells.co.uk> In-Reply-To: <5.0.2.1.1.20030804004417.02bcc920@popserver.sfu.ca> References: <5.0.2.1.1.20030804004417.02bcc920@popserver.sfu.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, On Monday 04 August 2003 08:54, Colin Percival wrote: > Affected applications which were statically linked to the vulnerable > code would still need to be recompiled. I'm just trying to work out which applications on my system are statically linked or not. Is using ldd the best (well, quickest I suppose) way?: su-2.05b# ldd `which nfsd` ldd: /sbin/nfsd: not a dynamic executable I running a server with stuff like nfs, samba, dhcpd, bind etc, and I'll CVSup and rebuild the bast system and kernel, but so far I've only been using binary packages... need to start using ports some time I suppose. Thanks! - -- Cheers, Chris Howells -- chris@chrishowells.co.uk, howells@kde.org Web: http://chrishowells.co.uk, PGP ID: 0x33795A2C KDE/Qt/C++/PHP Developer: http://www.kde.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2-rc1-SuSE (GNU/Linux) iD8DBQE/LiMcF8Iu1zN5WiwRAgJFAKCSLQulunFSNSj0FIWuiVqB2+ELaQCfRzRh YX+o58phnhzEkEARa80LkH4= =NFhz -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200308041010.52904.lists>
