Ronny,

You might be thinking of:
find /proc -name maps -exec egrep -l 'libssl095' {} /dev/null \; | sed
-e 's/[^0-9]//g' | xargs --no-run-if-empty ps --no-headers -p | sed -e
's/^\+//' -e 's/ \+/ /g' | cut -d ' ' -f 5 | sort | uniq
as posted in DSA 394 at:
http://www.debian.org/security/2003/dsa-394

HTH,

Andrew.

>>> Ronny Adsetts <[EMAIL PROTECTED]> 18/03/2004
10:03:34 >>>
Hi all.

Whilst doing security upgrades this morning for openssl, it occurred to
me 
that lots of software that uses the openssl libraries will not
automatically 
get restarted and will therefore still be running with old libraries
and 
therefore be vulnerable. I usually do this by hand for the most obvious

programs, but that can often get overlooked or things get missed.

I remember someone posting a method for locating programs that are
running 
with old libraries, but don't recall where and I can't seem to find the

right words whilst invoking google...

Before I go off and figure it out, does anyway have any scripts or
snippets 
that they use for locating these programs?

TIA,
Ronny
-- 
Technical Director
Amazing Internet Ltd, London
t: +44 20 8607 9535
f: +44 20 8607 9536
w: www.amazinginternet.com 


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact
[EMAIL PROTECTED] 

Reply via email to