Jeffrey Smelser:
> there is a rev-rebuild as part of the gentoolkit package. Anytime you 
> replace a library such as that.. Theory says, its suppose to provide
you 
> with this information... I think it will even recompile things that
need
> to be recompiled.
>
> I have only used it once, and it worked for that.. I just don't recall
what
> it was for... 

Hmmmm......It takes a 'qpkg --list gentoolkit' to reveal that
revdep-rebuild is provided in /usr/bin:

files jtosburn # man revdep-rebuild
No manual entry for revdep-rebuild

files jtosburn # revdep-rebuild --help
Usage: /usr/bin/revdep-rebuild [OPTIONS] [--] [EMERGE_OPTIONS]

Broken reverse dependency rebuilder.

  -X, --package-names  recompile based on package names, not exact
versions
      --soname SONAME  recompile packages using library with SONAME
instead
                       of broken library
      --soname-regexp SONAME
                       the same as --soname, but accepts grep-style
regexp
  -q, --quiet          be less verbose

Calls emerge, all other options are used for it (e. g. -p, --pretend).


If the developers think it's broken, then I wouldn't trust it, and I'm
not sure that it does what I'm looking for, anyway.

So the question remains:  how the heck do you know what needs to be
recompiled after any given (particularly security-realted) update?  How
many people are still running a mod_ssl that was compiled with a
vulnerable openssl;  sure they read the GLSA's and knew to update
openssl, but nothing was said about anything that is statically linked
to it.  I don't expect that the devels would ever list every program
possibly affected by a GLSA, but there ought o be a way for admins and
users to figure out what's what on their systems.

-Joel Osburn


--
[EMAIL PROTECTED] mailing list

Reply via email to