Revision: 5290 http://ipcop.svn.sourceforge.net/ipcop/?rev=5290&view=rev Author: gespinasse Date: 2011-01-03 07:33:15 +0000 (Mon, 03 Jan 2011)
Log Message: ----------- Upgrade glibc to 2.11.3, found that looking at ALT tree Update to 2.11.3 is untested for now, unsure I could do this way Modified Paths: -------------- ipcop/trunk/config/rootfiles/arch_i486/glibc ipcop/trunk/lfs/glibc ipcop/trunk/updates/1.9.18/ROOTFILES.i486-1.9.18 ipcop/trunk/updates/1.9.18/information.xml ipcop/trunk/updates/1.9.19/setup Removed Paths: ------------- ipcop/trunk/src/patches/glibc-2.11.2_ldaudit.patch ipcop/trunk/src/patches/glibc-2.11.2_makefile-fix-1.patch ipcop/trunk/src/patches/glibc-2.11.2_origin.patch Modified: ipcop/trunk/config/rootfiles/arch_i486/glibc =================================================================== --- ipcop/trunk/config/rootfiles/arch_i486/glibc 2010-12-31 13:11:50 UTC (rev 5289) +++ ipcop/trunk/config/rootfiles/arch_i486/glibc 2011-01-03 07:33:15 UTC (rev 5290) @@ -1,48 +1,48 @@ etc/ld.so.cache etc/localtime #etc/rpc -lib/ld-2.11.2.so +lib/ld-2.11.3.so lib/ld-linux.so.2 -#lib/libBrokenLocale-2.11.2.so +#lib/libBrokenLocale-2.11.3.so #lib/libBrokenLocale.so.1 #lib/libSegFault.so -#lib/libanl-2.11.2.so +#lib/libanl-2.11.3.so #lib/libanl.so.1 -lib/libc-2.11.2.so +lib/libc-2.11.3.so lib/libc.so.6 -lib/libcidn-2.11.2.so +lib/libcidn-2.11.3.so lib/libcidn.so.1 -lib/libcrypt-2.11.2.so +lib/libcrypt-2.11.3.so lib/libcrypt.so.1 -lib/libdl-2.11.2.so +lib/libdl-2.11.3.so lib/libdl.so.2 -lib/libm-2.11.2.so +lib/libm-2.11.3.so lib/libm.so.6 #lib/libmemusage.so -lib/libnsl-2.11.2.so +lib/libnsl-2.11.3.so lib/libnsl.so.1 -lib/libnss_compat-2.11.2.so +lib/libnss_compat-2.11.3.so lib/libnss_compat.so.2 -lib/libnss_dns-2.11.2.so +lib/libnss_dns-2.11.3.so lib/libnss_dns.so.2 -lib/libnss_files-2.11.2.so +lib/libnss_files-2.11.3.so lib/libnss_files.so.2 -#lib/libnss_hesiod-2.11.2.so +#lib/libnss_hesiod-2.11.3.so #lib/libnss_hesiod.so.2 -#lib/libnss_nis-2.11.2.so +#lib/libnss_nis-2.11.3.so #lib/libnss_nis.so.2 -#lib/libnss_nisplus-2.11.2.so +#lib/libnss_nisplus-2.11.3.so #lib/libnss_nisplus.so.2 #lib/libpcprofile.so -lib/libpthread-2.11.2.so +lib/libpthread-2.11.3.so lib/libpthread.so.0 -lib/libresolv-2.11.2.so +lib/libresolv-2.11.3.so lib/libresolv.so.2 -lib/librt-2.11.2.so +lib/librt-2.11.3.so lib/librt.so.1 #lib/libthread_db-1.0.so #lib/libthread_db.so.1 -lib/libutil-2.11.2.so +lib/libutil-2.11.3.so lib/libutil.so.1 sbin/ldconfig #sbin/sln Modified: ipcop/trunk/lfs/glibc =================================================================== --- ipcop/trunk/lfs/glibc 2010-12-31 13:11:50 UTC (rev 5289) +++ ipcop/trunk/lfs/glibc 2011-01-03 07:33:15 UTC (rev 5290) @@ -33,7 +33,7 @@ include Config PKG_NAME = glibc -VER = 2.11.2 +VER = 2.11.3 HOST_ARCH = all OTHER_SRC = yes @@ -59,7 +59,7 @@ $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_MD5 = 414fc1bad64c0e34ead0bb3d0f191456 +$(DL_FILE)_MD5 = acfeba0d7c9e86726b6c975bf6e9fccb install : $(TARGET) @@ -110,12 +110,6 @@ @rm -rf $(DIR_APP) $(DIR_SRC)/glibc-build && cd $(DIR_SRC) && tar -jxf $(DIR_DL)/$(DL_FILE) cd $(DIR_APP) && patch -Np1 -i $(DIR_PATCHES)/glibc-2.11.1_notimestamp.patch cd $(DIR_APP) && patch -Np1 -i $(DIR_PATCHES)/glibc-2.11_sparc-localedef-mmap.patch - # Fixes an incompatibility with Make-3.82 - cd $(DIR_APP) && patch -Np1 -i $(DIR_PATCHES)/glibc-2.11.2_makefile-fix-1.patch - # CVE-2010-10-3847 - cd $(DIR_APP) && patch -Np1 -i $(DIR_PATCHES)/glibc-2.11.2_origin.patch - # CVE-2010-10-3853 - cd $(DIR_APP) && patch -Np1 -i $(DIR_PATCHES)/glibc-2.11.2_ldaudit.patch @mkdir $(DIR_SRC)/glibc-build Deleted: ipcop/trunk/src/patches/glibc-2.11.2_ldaudit.patch =================================================================== --- ipcop/trunk/src/patches/glibc-2.11.2_ldaudit.patch 2010-12-31 13:11:50 UTC (rev 5289) +++ ipcop/trunk/src/patches/glibc-2.11.2_ldaudit.patch 2011-01-03 07:33:15 UTC (rev 5290) @@ -1,232 +0,0 @@ -http://sourceware.org/ml/libc-hacker/2010-10/msg00010.html - -[PATCH] Require suid bit on audit objects in privileged programs - - * From: Andreas Schwab <schwab at redhat dot com> - * To: libc-hacker at sourceware dot org - * Date: Fri, 22 Oct 2010 19:17:20 +0200 - * Subject: [PATCH] Require suid bit on audit objects in privileged programs - -2010-10-22 Andreas Schwab <sch...@redhat.com> - - * include/dlfcn.h (__RTLD_SECURE): Define. - * elf/dl-load.c (_dl_map_object): Remove preloaded parameter. Use - mode & __RTLD_SECURE instead. - (open_path): Rename preloaded parameter to secure. - * sysdeps/generic/ldsodefs.h (_dl_map_object): Adjust declaration. - * elf/dl-open.c (dl_open_worker): Adjust call to _dl_map_object. - * elf/dl-deps.c (openaux): Likewise. - * elf/rtld.c (struct map_args): Remove is_preloaded. - (map_doit): Don't use it. - (dl_main): Likewise. - (do_preload): Use __RTLD_SECURE instead of is_preloaded. - (dlmopen_doit): Add __RTLD_SECURE to mode bits. ---- - elf/dl-deps.c | 2 +- - elf/dl-load.c | 20 +++++++++++--------- - elf/dl-open.c | 2 +- - elf/rtld.c | 16 +++++++--------- - include/dlfcn.h | 1 + - sysdeps/generic/ldsodefs.h | 6 ++---- - 6 files changed, 23 insertions(+), 24 deletions(-) - -diff --git a/elf/dl-deps.c b/elf/dl-deps.c -index e5b9cdf..1cab2d1 100644 ---- a/elf/dl-deps.c -+++ b/elf/dl-deps.c -@@ -62,7 +62,7 @@ openaux (void *a) - { - struct openaux_args *args = (struct openaux_args *) a; - -- args->aux = _dl_map_object (args->map, args->name, 0, -+ args->aux = _dl_map_object (args->map, args->name, - (args->map->l_type == lt_executable - ? lt_library : args->map->l_type), - args->trace_mode, args->open_mode, -diff --git a/elf/dl-load.c b/elf/dl-load.c -index 776f7e4..9ab3520 100644 ---- a/elf/dl-load.c -+++ b/elf/dl-load.c -@@ -1808,7 +1808,7 @@ open_verify (const char *name, struct filebuf *fbp, struct link_map *loader, - if MAY_FREE_DIRS is true. */ - - static int --open_path (const char *name, size_t namelen, int preloaded, -+open_path (const char *name, size_t namelen, int secure, - struct r_search_path_struct *sps, char **realname, - struct filebuf *fbp, struct link_map *loader, int whatcode, - bool *found_other_class) -@@ -1890,7 +1890,7 @@ open_path (const char *name, size_t namelen, int preloaded, - /* Remember whether we found any existing directory. */ - here_any |= this_dir->status[cnt] != nonexisting; - -- if (fd != -1 && __builtin_expect (preloaded, 0) -+ if (fd != -1 && __builtin_expect (secure, 0) - && INTUSE(__libc_enable_secure)) - { - /* This is an extra security effort to make sure nobody can -@@ -1959,7 +1959,7 @@ open_path (const char *name, size_t namelen, int preloaded, - - struct link_map * - internal_function --_dl_map_object (struct link_map *loader, const char *name, int preloaded, -+_dl_map_object (struct link_map *loader, const char *name, - int type, int trace_mode, int mode, Lmid_t nsid) - { - int fd; -@@ -2063,7 +2063,8 @@ _dl_map_object (struct link_map *loader, const char *name, int preloaded, - for (l = loader; l; l = l->l_loader) - if (cache_rpath (l, &l->l_rpath_dirs, DT_RPATH, "RPATH")) - { -- fd = open_path (name, namelen, preloaded, &l->l_rpath_dirs, -+ fd = open_path (name, namelen, mode & __RTLD_SECURE, -+ &l->l_rpath_dirs, - &realname, &fb, loader, LA_SER_RUNPATH, - &found_other_class); - if (fd != -1) -@@ -2078,14 +2079,15 @@ _dl_map_object (struct link_map *loader, const char *name, int preloaded, - && main_map != NULL && main_map->l_type != lt_loaded - && cache_rpath (main_map, &main_map->l_rpath_dirs, DT_RPATH, - "RPATH")) -- fd = open_path (name, namelen, preloaded, &main_map->l_rpath_dirs, -+ fd = open_path (name, namelen, mode & __RTLD_SECURE, -+ &main_map->l_rpath_dirs, - &realname, &fb, loader ?: main_map, LA_SER_RUNPATH, - &found_other_class); - } - - /* Try the LD_LIBRARY_PATH environment variable. */ - if (fd == -1 && env_path_list.dirs != (void *) -1) -- fd = open_path (name, namelen, preloaded, &env_path_list, -+ fd = open_path (name, namelen, mode & __RTLD_SECURE, &env_path_list, - &realname, &fb, - loader ?: GL(dl_ns)[LM_ID_BASE]._ns_loaded, - LA_SER_LIBPATH, &found_other_class); -@@ -2094,12 +2096,12 @@ _dl_map_object (struct link_map *loader, const char *name, int preloaded, - if (fd == -1 && loader != NULL - && cache_rpath (loader, &loader->l_runpath_dirs, - DT_RUNPATH, "RUNPATH")) -- fd = open_path (name, namelen, preloaded, -+ fd = open_path (name, namelen, mode & __RTLD_SECURE, - &loader->l_runpath_dirs, &realname, &fb, loader, - LA_SER_RUNPATH, &found_other_class); - - if (fd == -1 -- && (__builtin_expect (! preloaded, 1) -+ && (__builtin_expect (! (mode & __RTLD_SECURE), 1) - || ! INTUSE(__libc_enable_secure))) - { - /* Check the list of libraries in the file /etc/ld.so.cache, -@@ -2165,7 +2167,7 @@ _dl_map_object (struct link_map *loader, const char *name, int preloaded, - && ((l = loader ?: GL(dl_ns)[nsid]._ns_loaded) == NULL - || __builtin_expect (!(l->l_flags_1 & DF_1_NODEFLIB), 1)) - && rtld_search_dirs.dirs != (void *) -1) -- fd = open_path (name, namelen, preloaded, &rtld_search_dirs, -+ fd = open_path (name, namelen, mode & __RTLD_SECURE, &rtld_search_dirs, - &realname, &fb, l, LA_SER_DEFAULT, &found_other_class); - - /* Add another newline when we are tracing the library loading. */ -diff --git a/elf/dl-open.c b/elf/dl-open.c -index c394b3f..cf8e8cc 100644 ---- a/elf/dl-open.c -+++ b/elf/dl-open.c -@@ -223,7 +223,7 @@ dl_open_worker (void *a) - - /* Load the named object. */ - struct link_map *new; -- args->map = new = _dl_map_object (call_map, file, 0, lt_loaded, 0, -+ args->map = new = _dl_map_object (call_map, file, lt_loaded, 0, - mode | __RTLD_CALLMAP, args->nsid); - - /* If the pointer returned is NULL this means the RTLD_NOLOAD flag is -diff --git a/elf/rtld.c b/elf/rtld.c -index 201c9cf..4a8cee8 100644 ---- a/elf/rtld.c -+++ b/elf/rtld.c -@@ -587,7 +587,6 @@ struct map_args - /* Argument to map_doit. */ - char *str; - struct link_map *loader; -- int is_preloaded; - int mode; - /* Return value of map_doit. */ - struct link_map *map; -@@ -625,16 +624,17 @@ static void - map_doit (void *a) - { - struct map_args *args = (struct map_args *) a; -- args->map = _dl_map_object (args->loader, args->str, -- args->is_preloaded, lt_library, 0, args->mode, -- LM_ID_BASE); -+ args->map = _dl_map_object (args->loader, args->str, lt_library, 0, -+ args->mode, LM_ID_BASE); - } - - static void - dlmopen_doit (void *a) - { - struct dlmopen_args *args = (struct dlmopen_args *) a; -- args->map = _dl_open (args->fname, RTLD_LAZY | __RTLD_DLOPEN | __RTLD_AUDIT, -+ args->map = _dl_open (args->fname, -+ (RTLD_LAZY | __RTLD_DLOPEN | __RTLD_AUDIT -+ | __RTLD_SECURE), - dl_main, LM_ID_NEWLM, _dl_argc, INTUSE(_dl_argv), - __environ); - } -@@ -804,8 +804,7 @@ do_preload (char *fname, struct link_map *main_map, const char *where) - - args.str = fname; - args.loader = main_map; -- args.is_preloaded = 1; -- args.mode = 0; -+ args.mode = __RTLD_SECURE; - - unsigned int old_nloaded = GL(dl_ns)[LM_ID_BASE]._ns_nloaded; - -@@ -1050,7 +1049,6 @@ of this helper program; chances are you did not intend to run this program.\n\ - - args.str = rtld_progname; - args.loader = NULL; -- args.is_preloaded = 0; - args.mode = __RTLD_OPENEXEC; - (void) _dl_catch_error (&objname, &err_str, &malloced, map_doit, - &args); -@@ -1062,7 +1060,7 @@ of this helper program; chances are you did not intend to run this program.\n\ - else - { - HP_TIMING_NOW (start); -- _dl_map_object (NULL, rtld_progname, 0, lt_library, 0, -+ _dl_map_object (NULL, rtld_progname, lt_library, 0, - __RTLD_OPENEXEC, LM_ID_BASE); - HP_TIMING_NOW (stop); - -diff --git a/include/dlfcn.h b/include/dlfcn.h -index a67426d..af92483 100644 ---- a/include/dlfcn.h -+++ b/include/dlfcn.h -@@ -9,6 +9,7 @@ - #define __RTLD_OPENEXEC 0x20000000 - #define __RTLD_CALLMAP 0x10000000 - #define __RTLD_AUDIT 0x08000000 -+#define __RTLD_SECURE 0x04000000 /* Apply additional security checks. */ - - #define __LM_ID_CALLER -2 - -diff --git a/sysdeps/generic/ldsodefs.h b/sysdeps/generic/ldsodefs.h -index fcc943b..fa4b6b2 100644 ---- a/sysdeps/generic/ldsodefs.h -+++ b/sysdeps/generic/ldsodefs.h -@@ -824,11 +824,9 @@ extern void _dl_receive_error (receiver_fct fct, void (*operate) (void *), - - /* Open the shared object NAME and map in its segments. - LOADER's DT_RPATH is used in searching for NAME. -- If the object is already opened, returns its existing map. -- For preloaded shared objects PRELOADED is set to a non-zero -- value to allow additional security checks. */ -+ If the object is already opened, returns its existing map. */ - extern struct link_map *_dl_map_object (struct link_map *loader, -- const char *name, int preloaded, -+ const char *name, - int type, int trace_mode, int mode, - Lmid_t nsid) - internal_function attribute_hidden; Deleted: ipcop/trunk/src/patches/glibc-2.11.2_makefile-fix-1.patch =================================================================== --- ipcop/trunk/src/patches/glibc-2.11.2_makefile-fix-1.patch 2010-12-31 13:11:50 UTC (rev 5289) +++ ipcop/trunk/src/patches/glibc-2.11.2_makefile-fix-1.patch 2011-01-03 07:33:15 UTC (rev 5290) @@ -1,28 +0,0 @@ -Submitted By: Matt Burgess <matthew_at_linuxfromscratch_dot_org> -Date: 2010-07-26 -Initial Package Version: 2.11.2 -Upstream Status: Not submitted -Origin: Denis Onischenko - (http://www.mail-archive.com/help-make@gnu.org/msg08847.html) -Description: Fixes an incompatibility with Make-3.82. - -diff -Naur glibc-2.11.2.orig/manual/Makefile glibc-2.11.2/manual/Makefile ---- glibc-2.11.2.orig/manual/Makefile 2010-05-19 20:38:20.000000000 +0000 -+++ glibc-2.11.2/manual/Makefile 2010-07-26 06:51:27.049899308 +0000 -@@ -232,9 +232,13 @@ - .PHONY: stubs - stubs: $(objpfx)stubs - endif --$(objpfx)stubs ../po/manual.pot $(objpfx)stamp%: -- $(make-target-directory) -- touch $@ -+$(objpfx)stubs ../po/manual.pot: -+ $(make-target-directory) -+ touch $@ -+ -+$(objpfx)stamp%: -+ $(make-target-directory) -+ touch $@ - - # Make the target directory if it doesn't exist, using the `mkinstalldirs' - # script that does `mkdir -p' even if `mkdir' doesn't support that flag. Deleted: ipcop/trunk/src/patches/glibc-2.11.2_origin.patch =================================================================== --- ipcop/trunk/src/patches/glibc-2.11.2_origin.patch 2010-12-31 13:11:50 UTC (rev 5289) +++ ipcop/trunk/src/patches/glibc-2.11.2_origin.patch 2011-01-03 07:33:15 UTC (rev 5290) @@ -1,82 +0,0 @@ -2010-10-18 Andreas Schwab <sch...@redhat.com> - - * elf/dl-load.c (is_dst): Remove last parameter. - (_dl_dst_count): Ignore $ORIGIN in privileged programs. - (_dl_dst_substitute): Likewise. ---- - elf/dl-load.c | 30 +++++++++++++----------------- - 1 files changed, 13 insertions(+), 17 deletions(-) - -diff --git a/elf/dl-load.c b/elf/dl-load.c -index a7162eb..776f7e4 100644 ---- a/elf/dl-load.c -+++ b/elf/dl-load.c -@@ -169,8 +169,7 @@ local_strdup (const char *s) - - - static size_t --is_dst (const char *start, const char *name, const char *str, -- int is_path, int secure) -+is_dst (const char *start, const char *name, const char *str, int is_path) - { - size_t len; - bool is_curly = false; -@@ -199,11 +198,6 @@ is_dst (const char *start, const char *name, const char *str, - && (!is_path || name[len] != ':')) - return 0; - -- if (__builtin_expect (secure, 0) -- && ((name[len] != '\0' && (!is_path || name[len] != ':')) -- || (name != start + 1 && (!is_path || name[-2] != ':')))) -- return 0; -- - return len; - } - -@@ -218,13 +212,12 @@ _dl_dst_count (const char *name, int is_path) - { - size_t len; - -- /* $ORIGIN is not expanded for SUID/GUID programs (except if it -- is $ORIGIN alone) and it must always appear first in path. */ -+ /* $ORIGIN is not expanded for SUID/GUID programs. */ - ++name; -- if ((len = is_dst (start, name, "ORIGIN", is_path, -- INTUSE(__libc_enable_secure))) != 0 -- || (len = is_dst (start, name, "PLATFORM", is_path, 0)) != 0 -- || (len = is_dst (start, name, "LIB", is_path, 0)) != 0) -+ if (((len = is_dst (start, name, "ORIGIN", is_path)) != 0 -+ && !INTUSE(__libc_enable_secure)) -+ || (len = is_dst (start, name, "PLATFORM", is_path)) != 0 -+ || (len = is_dst (start, name, "LIB", is_path)) != 0) - ++cnt; - - name = strchr (name + len, '$'); -@@ -256,9 +249,12 @@ _dl_dst_substitute (struct link_map *l, const char *name, char *result, - size_t len; - - ++name; -- if ((len = is_dst (start, name, "ORIGIN", is_path, -- INTUSE(__libc_enable_secure))) != 0) -+ if ((len = is_dst (start, name, "ORIGIN", is_path)) != 0) - { -+ /* Ignore this path element in SUID/SGID programs. */ -+ if (INTUSE(__libc_enable_secure)) -+ repl = (const char *) -1; -+ else - #ifndef SHARED - if (l == NULL) - repl = _dl_get_origin (); -@@ -266,9 +262,9 @@ _dl_dst_substitute (struct link_map *l, const char *name, char *result, - #endif - repl = l->l_origin; - } -- else if ((len = is_dst (start, name, "PLATFORM", is_path, 0)) != 0) -+ else if ((len = is_dst (start, name, "PLATFORM", is_path)) != 0) - repl = GLRO(dl_platform); -- else if ((len = is_dst (start, name, "LIB", is_path, 0)) != 0) -+ else if ((len = is_dst (start, name, "LIB", is_path)) != 0) - repl = DL_DST_LIB; - - if (repl != NULL && repl != (const char *) -1) - Modified: ipcop/trunk/updates/1.9.18/ROOTFILES.i486-1.9.18 =================================================================== --- ipcop/trunk/updates/1.9.18/ROOTFILES.i486-1.9.18 2010-12-31 13:11:50 UTC (rev 5289) +++ ipcop/trunk/updates/1.9.18/ROOTFILES.i486-1.9.18 2011-01-03 07:33:15 UTC (rev 5290) @@ -241,6 +241,22 @@ /usr/lib/libfreetype.so.6 /usr/lib/libfreetype.so.6.6.2 ## +## glibc-2.11.3 +/lib/ld-2.11.3.so +/lib/libc-2.11.3.so +/lib/libcidn-2.11.3.so +/lib/libcrypt-2.11.3.so +/lib/libdl-2.11.3.so +/lib/libm-2.11.3.so +/lib/libnsl-2.11.3.so +/lib/libnss_compat-2.11.3.so +/lib/libnss_dns-2.11.3.so +/lib/libnss_files-2.11.3.so +/lib/libpthread-2.11.3.so +/lib/libresolv-2.11.3.so +/lib/librt-2.11.3.so +/lib/libutil-2.11.3.so +## ## glib-2.25.17 /usr/lib/libglib-2.0.so /usr/lib/libglib-2.0.so.0 Modified: ipcop/trunk/updates/1.9.18/information.xml =================================================================== --- ipcop/trunk/updates/1.9.18/information.xml 2010-12-31 13:11:50 UTC (rev 5289) +++ ipcop/trunk/updates/1.9.18/information.xml 2011-01-03 07:33:15 UTC (rev 5290) @@ -5,7 +5,7 @@ <size>0</size> <description>Language updates.<br /> Upgrade acpid to 2.0.7, apache to 2.2.17, bash to 4.1.9, cairo to 1.10.0, coreutils to 8.8, dejavu-fonts to 2.32, - dhcpcd to 5.2.9, e2fsprogs to 1.41.14, ethtool to 2.6.35, freetype to 2.4.4, gnupg to 1.4.11, grep to 2.7, hdparm to 9.34, + dhcpcd to 5.2.9, e2fsprogs to 1.41.14, ethtool to 2.6.35, freetype to 2.4.4, glibc to 2.11.3, gnupg to 1.4.11, grep to 2.7, hdparm to 9.34, iptables to 1.4.10, iputils to s20101006, iw to 0.9.21, libnl to 2.0, libpng to 1.4.5, libxml2 to 2.7.8, openssh to 5.6, openssl to 0.9.8q, openswan to 2.6.32, pango to 1.28.3, pixman to 0.18.4, psmisc to 22.13, rrdtool to 1.4.5, smartmontools to 5.40, sqlite to 3.7.3, tar to 1.25, traceroute to 2.0.16, Modified: ipcop/trunk/updates/1.9.19/setup =================================================================== --- ipcop/trunk/updates/1.9.19/setup 2010-12-31 13:11:50 UTC (rev 5289) +++ ipcop/trunk/updates/1.9.19/setup 2011-01-03 07:33:15 UTC (rev 5290) @@ -64,6 +64,20 @@ /bin/rm -f /lib/libhistory.so.6.1 /bin/rm -f /lib/libreadline.so.6 /bin/rm -f /lib/libreadline.so.6.1 +/bin/rm -f /lib/ld-2.11.2.so +/bin/rm -f /lib/libc-2.11.2.so +/bin/rm -f /lib/libcidn-2.11.2.so +/bin/rm -f /lib/libcrypt-2.11.2.so +/bin/rm -f /lib/libdl-2.11.2.so +/bin/rm -f /lib/libm-2.11.2.so +/bin/rm -f /lib/libnsl-2.11.2.so +/bin/rm -f /lib/libnss_compat-2.11.2.so +/bin/rm -f /lib/libnss_dns-2.11.2.so +/bin/rm -f /lib/libnss_files-2.11.2.so +/bin/rm -f /lib/libpthread-2.11.2.so +/bin/rm -f /lib/libresolv-2.11.2.so +/bin/rm -f /lib/librt-2.11.2.so +/bin/rm -f /lib/libutil-2.11.2.so # For new shared libs. May not always be required, but makes sure we do not forget /sbin/ldconfig This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site. ------------------------------------------------------------------------------ Learn how Oracle Real Application Clusters (RAC) One Node allows customers to consolidate database storage, standardize their database environment, and, should the need arise, upgrade to a full multi-node Oracle RAC database without downtime or disruption http://p.sf.net/sfu/oracle-sfdevnl _______________________________________________ Ipcop-svn mailing list Ipcop-svn@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipcop-svn