Revision: 6958 http://ipcop.svn.sourceforge.net/ipcop/?rev=6958&view=rev Author: gespinasse Date: 2013-03-11 11:42:52 +0000 (Mon, 11 Mar 2013) Log Message: ----------- Upgrade libxml2 to 2.9.0
ac_cv_path_RM='rm -f' will be unneeded after 2.9.0 Disable zlib and thread features, that is not used in our case. Probably I could disable more optional features. I may try in the futur. Modified Paths: -------------- ipcop/trunk/config/rootfiles/common/libxml2 ipcop/trunk/lfs/libxml2 ipcop/trunk/updates/2.1.0/ROOTFILES.i486-2.1.0 ipcop/trunk/updates/2.1.0/information.xml ipcop/trunk/updates/2.1.0/setup Removed Paths: ------------- ipcop/trunk/src/patches/libxml2-2.8.0_entities-local-buffers-size-problems.patch ipcop/trunk/src/patches/libxml2-2.8.0_parser-local-buffers-size-problems.patch Modified: ipcop/trunk/config/rootfiles/common/libxml2 =================================================================== --- ipcop/trunk/config/rootfiles/common/libxml2 2013-03-07 05:35:58 UTC (rev 6957) +++ ipcop/trunk/config/rootfiles/common/libxml2 2013-03-11 11:42:52 UTC (rev 6958) @@ -53,18 +53,18 @@ #usr/lib/libxml2.la #usr/lib/libxml2.so usr/lib/libxml2.so.2 -usr/lib/libxml2.so.2.8.0 +usr/lib/libxml2.so.2.9.0 #usr/lib/pkgconfig/libxml-2.0.pc #usr/lib/xml2Conf.sh #usr/share/aclocal/libxml.m4 #usr/share/doc/libxml2 -#usr/share/doc/libxml2-2.8.0 -#usr/share/doc/libxml2-2.8.0/Copyright -#usr/share/doc/libxml2-2.8.0/examples -#usr/share/doc/libxml2-2.8.0/examples/testHTML.c -#usr/share/doc/libxml2-2.8.0/examples/testSAX.c -#usr/share/doc/libxml2-2.8.0/examples/testXPath.c -#usr/share/doc/libxml2-2.8.0/examples/xmllint.c +#usr/share/doc/libxml2-2.9.0 +#usr/share/doc/libxml2-2.9.0/Copyright +#usr/share/doc/libxml2-2.9.0/examples +#usr/share/doc/libxml2-2.9.0/examples/testHTML.c +#usr/share/doc/libxml2-2.9.0/examples/testSAX.c +#usr/share/doc/libxml2-2.9.0/examples/testXPath.c +#usr/share/doc/libxml2-2.9.0/examples/xmllint.c #usr/share/doc/libxml2/html #usr/share/doc/libxml2/html/DOM.gif #usr/share/doc/libxml2/html/FAQ.html @@ -126,9 +126,9 @@ #usr/share/doc/libxml2/html/html/libxml-xpath.html #usr/share/doc/libxml2/html/html/libxml-xpathInternals.html #usr/share/doc/libxml2/html/html/libxml-xpointer.html -#usr/share/doc/libxml2/html/html/libxml-xzlib.html #usr/share/doc/libxml2/html/html/right.png #usr/share/doc/libxml2/html/html/up.png +#usr/share/doc/libxml2/html/index.html #usr/share/doc/libxml2/html/io1.c #usr/share/doc/libxml2/html/io1.res #usr/share/doc/libxml2/html/io2.c Modified: ipcop/trunk/lfs/libxml2 =================================================================== --- ipcop/trunk/lfs/libxml2 2013-03-07 05:35:58 UTC (rev 6957) +++ ipcop/trunk/lfs/libxml2 2013-03-11 11:42:52 UTC (rev 6958) @@ -33,7 +33,7 @@ include Config PKG_NAME := libxml2 -VER := 2.8.0 +VER := 2.9.0 HOST_ARCH := all OTHER_SRC := yes @@ -55,7 +55,7 @@ $(DL_FILE) := $(DL_FROM)/$(DL_FILE) $(XMLTEST) := http://www.w3.org/XML/Test/$(XMLTEST) -$(DL_FILE)_MD5 := c62106f02ee00b6437f0fb9d370c1093 +$(DL_FILE)_MD5 := 5b9bebf4f5d2200ae2c4efe8fa6103f7 $(XMLTEST)_MD5 := ae3d1ebe000a3972afa104ca7f0e1b4a install : $(TARGET) @@ -86,20 +86,17 @@ $(TARGET) : $(firstword $(MAKEFILE_LIST)) $(patsubst %,$(DIR_DL)/%,$(objects)) @$(PREBUILD) @rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar zxf $(DIR_DL)/$(DL_FILE) - # CVE-2012-2807 2 patches debian borrowed - cd $(DIR_APP) && patch -p1 -i $(DIR_PATCHES)/$(THISAPP)_parser-local-buffers-size-problems.patch - cd $(DIR_APP) && patch -p1 -i $(DIR_PATCHES)/$(THISAPP)_entities-local-buffers-size-problems.patch - # Workaround install warning cannot stat `./*.html' - cd $(DIR_APP) && sed -i 's|$$(srcdir)/\*.html ||' doc/examples/Makefile.in - # --docdir does nothing on 2.7.8 # --with-minimum is broken on 2.7.8, not on 2.7.7 but hard to know what to test # maybe we could reduce more the lib, who know? # Removing version from --with-html-subdir limit the noise on upgrade # --without-python because we don't need python support + # --without-zlib because no prog use that feature + # --without-threads because this is not needed, (and it remove a lot of warnings) rrdtool test only for xmlParseFile feature # ac_cv_path_RM='rm -f' prevent "cannot remove" messages, explanation at http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=523750 - cd $(DIR_APP) && ac_cv_path_RM='rm -f' \ + # remove the ac_cv_path_RM workaround after 2.9.0 + cd $(DIR_APP) && ac_cv_path_RM='rm -f' \ ./configure \ --prefix=/usr \ --disable-static \ @@ -108,8 +105,10 @@ --without-ftp \ --without-http \ --without-legacy \ + --without-python \ --without-regexps \ - --without-python + --without-threads \ + --without-zlib cd $(DIR_APP) && make -j $(PARALLELISM) Deleted: ipcop/trunk/src/patches/libxml2-2.8.0_entities-local-buffers-size-problems.patch =================================================================== --- ipcop/trunk/src/patches/libxml2-2.8.0_entities-local-buffers-size-problems.patch 2013-03-07 05:35:58 UTC (rev 6957) +++ ipcop/trunk/src/patches/libxml2-2.8.0_entities-local-buffers-size-problems.patch 2013-03-11 11:42:52 UTC (rev 6958) @@ -1,98 +0,0 @@ -From: Daniel Veillard <veill...@redhat.com> -Date: Wed, 18 Jul 2012 11:38:17 +0800 -Subject: Fix entities local buffers size problems - ---- - entities.c | 36 +++++++++++++++++++++++------------- - 1 file changed, 23 insertions(+), 13 deletions(-) - -diff --git a/entities.c b/entities.c -index 6aef49f..a02738d 100644 ---- a/entities.c -+++ b/entities.c -@@ -528,13 +528,13 @@ xmlGetDocEntity(xmlDocPtr doc, const xmlChar *name) { - * Macro used to grow the current buffer. - */ - #define growBufferReentrant() { \ -- buffer_size *= 2; \ -- buffer = (xmlChar *) \ -- xmlRealloc(buffer, buffer_size * sizeof(xmlChar)); \ -- if (buffer == NULL) { \ -- xmlEntitiesErrMemory("xmlEncodeEntitiesReentrant: realloc failed");\ -- return(NULL); \ -- } \ -+ xmlChar *tmp; \ -+ size_t new_size = buffer_size * 2; \ -+ if (new_size < buffer_size) goto mem_error; \ -+ tmp = (xmlChar *) xmlRealloc(buffer, new_size); \ -+ if (tmp == NULL) goto mem_error; \ -+ buffer = tmp; \ -+ buffer_size = new_size; \ - } - - -@@ -555,7 +555,7 @@ xmlEncodeEntitiesReentrant(xmlDocPtr doc, const xmlChar *input) { - const xmlChar *cur = input; - xmlChar *buffer = NULL; - xmlChar *out = NULL; -- int buffer_size = 0; -+ size_t buffer_size = 0; - int html = 0; - - if (input == NULL) return(NULL); -@@ -574,8 +574,8 @@ xmlEncodeEntitiesReentrant(xmlDocPtr doc, const xmlChar *input) { - out = buffer; - - while (*cur != '\0') { -- if (out - buffer > buffer_size - 100) { -- int indx = out - buffer; -+ size_t indx = out - buffer; -+ if (indx + 100 > buffer_size) { - - growBufferReentrant(); - out = &buffer[indx]; -@@ -692,6 +692,11 @@ xmlEncodeEntitiesReentrant(xmlDocPtr doc, const xmlChar *input) { - } - *out = 0; - return(buffer); -+ -+mem_error: -+ xmlEntitiesErrMemory("xmlEncodeEntitiesReentrant: realloc failed"); -+ xmlFree(buffer); -+ return(NULL); - } - - /** -@@ -709,7 +714,7 @@ xmlEncodeSpecialChars(xmlDocPtr doc ATTRIBUTE_UNUSED, const xmlChar *input) { - const xmlChar *cur = input; - xmlChar *buffer = NULL; - xmlChar *out = NULL; -- int buffer_size = 0; -+ size_t buffer_size = 0; - if (input == NULL) return(NULL); - - /* -@@ -724,8 +729,8 @@ xmlEncodeSpecialChars(xmlDocPtr doc ATTRIBUTE_UNUSED, const xmlChar *input) { - out = buffer; - - while (*cur != '\0') { -- if (out - buffer > buffer_size - 10) { -- int indx = out - buffer; -+ size_t indx = out - buffer; -+ if (indx + 10 > buffer_size) { - - growBufferReentrant(); - out = &buffer[indx]; -@@ -774,6 +779,11 @@ xmlEncodeSpecialChars(xmlDocPtr doc ATTRIBUTE_UNUSED, const xmlChar *input) { - } - *out = 0; - return(buffer); -+ -+mem_error: -+ xmlEntitiesErrMemory("xmlEncodeSpecialChars: realloc failed"); -+ xmlFree(buffer); -+ return(NULL); - } - - /** --- Deleted: ipcop/trunk/src/patches/libxml2-2.8.0_parser-local-buffers-size-problems.patch =================================================================== --- ipcop/trunk/src/patches/libxml2-2.8.0_parser-local-buffers-size-problems.patch 2013-03-07 05:35:58 UTC (rev 6957) +++ ipcop/trunk/src/patches/libxml2-2.8.0_parser-local-buffers-size-problems.patch 2013-03-11 11:42:52 UTC (rev 6958) @@ -1,261 +0,0 @@ -From: Daniel Veillard <veill...@redhat.com> -Date: Tue, 17 Jul 2012 16:19:17 +0800 -Subject: Fix parser local buffers size problems - ---- - parser.c | 74 ++++++++++++++++++++++++++++++++++++-------------------------- - 1 file changed, 43 insertions(+), 31 deletions(-) - -diff --git a/parser.c b/parser.c -index 2c38fae..9863275 100644 ---- a/parser.c -+++ b/parser.c -@@ -40,6 +40,7 @@ - #endif - - #include <stdlib.h> -+#include <limits.h> - #include <string.h> - #include <stdarg.h> - #include <libxml/xmlmemory.h> -@@ -117,10 +118,10 @@ xmlCreateEntityParserCtxtInternal(const xmlChar *URL, const xmlChar *ID, - * parser option. - */ - static int --xmlParserEntityCheck(xmlParserCtxtPtr ctxt, unsigned long size, -+xmlParserEntityCheck(xmlParserCtxtPtr ctxt, size_t size, - xmlEntityPtr ent) - { -- unsigned long consumed = 0; -+ size_t consumed = 0; - - if ((ctxt == NULL) || (ctxt->options & XML_PARSE_HUGE)) - return (0); -@@ -2589,15 +2590,17 @@ xmlParserHandlePEReference(xmlParserCtxtPtr ctxt) { - - /* - * Macro used to grow the current buffer. -+ * buffer##_size is expected to be a size_t -+ * mem_error: is expected to handle memory allocation failures - */ - #define growBuffer(buffer, n) { \ - xmlChar *tmp; \ -- buffer##_size *= 2; \ -- buffer##_size += n; \ -- tmp = (xmlChar *) \ -- xmlRealloc(buffer, buffer##_size * sizeof(xmlChar)); \ -+ size_t new_size = buffer##_size * 2 + n; \ -+ if (new_size < buffer##_size) goto mem_error; \ -+ tmp = (xmlChar *) xmlRealloc(buffer, new_size); \ - if (tmp == NULL) goto mem_error; \ - buffer = tmp; \ -+ buffer##_size = new_size; \ - } - - /** -@@ -2623,14 +2626,14 @@ xmlChar * - xmlStringLenDecodeEntities(xmlParserCtxtPtr ctxt, const xmlChar *str, int len, - int what, xmlChar end, xmlChar end2, xmlChar end3) { - xmlChar *buffer = NULL; -- int buffer_size = 0; -+ size_t buffer_size = 0; -+ size_t nbchars = 0; - - xmlChar *current = NULL; - xmlChar *rep = NULL; - const xmlChar *last; - xmlEntityPtr ent; - int c,l; -- int nbchars = 0; - - if ((ctxt == NULL) || (str == NULL) || (len < 0)) - return(NULL); -@@ -2647,7 +2650,7 @@ xmlStringLenDecodeEntities(xmlParserCtxtPtr ctxt, const xmlChar *str, int len, - * allocate a translation buffer. - */ - buffer_size = XML_PARSER_BIG_BUFFER_SIZE; -- buffer = (xmlChar *) xmlMallocAtomic(buffer_size * sizeof(xmlChar)); -+ buffer = (xmlChar *) xmlMallocAtomic(buffer_size); - if (buffer == NULL) goto mem_error; - - /* -@@ -2667,7 +2670,7 @@ xmlStringLenDecodeEntities(xmlParserCtxtPtr ctxt, const xmlChar *str, int len, - if (val != 0) { - COPY_BUF(0,buffer,nbchars,val); - } -- if (nbchars > buffer_size - XML_PARSER_BUFFER_SIZE) { -+ if (nbchars + XML_PARSER_BUFFER_SIZE > buffer_size) { - growBuffer(buffer, XML_PARSER_BUFFER_SIZE); - } - } else if ((c == '&') && (what & XML_SUBSTITUTE_REF)) { -@@ -2685,7 +2688,7 @@ xmlStringLenDecodeEntities(xmlParserCtxtPtr ctxt, const xmlChar *str, int len, - (ent->etype == XML_INTERNAL_PREDEFINED_ENTITY)) { - if (ent->content != NULL) { - COPY_BUF(0,buffer,nbchars,ent->content[0]); -- if (nbchars > buffer_size - XML_PARSER_BUFFER_SIZE) { -+ if (nbchars + XML_PARSER_BUFFER_SIZE > buffer_size) { - growBuffer(buffer, XML_PARSER_BUFFER_SIZE); - } - } else { -@@ -2702,8 +2705,7 @@ xmlStringLenDecodeEntities(xmlParserCtxtPtr ctxt, const xmlChar *str, int len, - current = rep; - while (*current != 0) { /* non input consuming loop */ - buffer[nbchars++] = *current++; -- if (nbchars > -- buffer_size - XML_PARSER_BUFFER_SIZE) { -+ if (nbchars + XML_PARSER_BUFFER_SIZE > buffer_size) { - if (xmlParserEntityCheck(ctxt, nbchars, ent)) - goto int_error; - growBuffer(buffer, XML_PARSER_BUFFER_SIZE); -@@ -2717,7 +2719,7 @@ xmlStringLenDecodeEntities(xmlParserCtxtPtr ctxt, const xmlChar *str, int len, - const xmlChar *cur = ent->name; - - buffer[nbchars++] = '&'; -- if (nbchars > buffer_size - i - XML_PARSER_BUFFER_SIZE) { -+ if (nbchars + i + XML_PARSER_BUFFER_SIZE > buffer_size) { - growBuffer(buffer, i + XML_PARSER_BUFFER_SIZE); - } - for (;i > 0;i--) -@@ -2745,8 +2747,7 @@ xmlStringLenDecodeEntities(xmlParserCtxtPtr ctxt, const xmlChar *str, int len, - current = rep; - while (*current != 0) { /* non input consuming loop */ - buffer[nbchars++] = *current++; -- if (nbchars > -- buffer_size - XML_PARSER_BUFFER_SIZE) { -+ if (nbchars + XML_PARSER_BUFFER_SIZE > buffer_size) { - if (xmlParserEntityCheck(ctxt, nbchars, ent)) - goto int_error; - growBuffer(buffer, XML_PARSER_BUFFER_SIZE); -@@ -2759,8 +2760,8 @@ xmlStringLenDecodeEntities(xmlParserCtxtPtr ctxt, const xmlChar *str, int len, - } else { - COPY_BUF(l,buffer,nbchars,c); - str += l; -- if (nbchars > buffer_size - XML_PARSER_BUFFER_SIZE) { -- growBuffer(buffer, XML_PARSER_BUFFER_SIZE); -+ if (nbchars + XML_PARSER_BUFFER_SIZE > buffer_size) { -+ growBuffer(buffer, XML_PARSER_BUFFER_SIZE); - } - } - if (str < last) -@@ -3764,8 +3765,8 @@ xmlParseAttValueComplex(xmlParserCtxtPtr ctxt, int *attlen, int normalize) { - xmlChar limit = 0; - xmlChar *buf = NULL; - xmlChar *rep = NULL; -- int len = 0; -- int buf_size = 0; -+ size_t len = 0; -+ size_t buf_size = 0; - int c, l, in_space = 0; - xmlChar *current = NULL; - xmlEntityPtr ent; -@@ -3787,7 +3788,7 @@ xmlParseAttValueComplex(xmlParserCtxtPtr ctxt, int *attlen, int normalize) { - * allocate a translation buffer. - */ - buf_size = XML_PARSER_BUFFER_SIZE; -- buf = (xmlChar *) xmlMallocAtomic(buf_size * sizeof(xmlChar)); -+ buf = (xmlChar *) xmlMallocAtomic(buf_size); - if (buf == NULL) goto mem_error; - - /* -@@ -3804,7 +3805,7 @@ xmlParseAttValueComplex(xmlParserCtxtPtr ctxt, int *attlen, int normalize) { - - if (val == '&') { - if (ctxt->replaceEntities) { -- if (len > buf_size - 10) { -+ if (len + 10 > buf_size) { - growBuffer(buf, 10); - } - buf[len++] = '&'; -@@ -3813,7 +3814,7 @@ xmlParseAttValueComplex(xmlParserCtxtPtr ctxt, int *attlen, int normalize) { - * The reparsing will be done in xmlStringGetNodeList() - * called by the attribute() function in SAX.c - */ -- if (len > buf_size - 10) { -+ if (len + 10 > buf_size) { - growBuffer(buf, 10); - } - buf[len++] = '&'; -@@ -3823,7 +3824,7 @@ xmlParseAttValueComplex(xmlParserCtxtPtr ctxt, int *attlen, int normalize) { - buf[len++] = ';'; - } - } else if (val != 0) { -- if (len > buf_size - 10) { -+ if (len + 10 > buf_size) { - growBuffer(buf, 10); - } - len += xmlCopyChar(0, &buf[len], val); -@@ -3835,7 +3836,7 @@ xmlParseAttValueComplex(xmlParserCtxtPtr ctxt, int *attlen, int normalize) { - ctxt->nbentities += ent->owner; - if ((ent != NULL) && - (ent->etype == XML_INTERNAL_PREDEFINED_ENTITY)) { -- if (len > buf_size - 10) { -+ if (len + 10 > buf_size) { - growBuffer(buf, 10); - } - if ((ctxt->replaceEntities == 0) && -@@ -3863,7 +3864,7 @@ xmlParseAttValueComplex(xmlParserCtxtPtr ctxt, int *attlen, int normalize) { - current++; - } else - buf[len++] = *current++; -- if (len > buf_size - 10) { -+ if (len + 10 > buf_size) { - growBuffer(buf, 10); - } - } -@@ -3871,7 +3872,7 @@ xmlParseAttValueComplex(xmlParserCtxtPtr ctxt, int *attlen, int normalize) { - rep = NULL; - } - } else { -- if (len > buf_size - 10) { -+ if (len + 10 > buf_size) { - growBuffer(buf, 10); - } - if (ent->content != NULL) -@@ -3899,7 +3900,7 @@ xmlParseAttValueComplex(xmlParserCtxtPtr ctxt, int *attlen, int normalize) { - * Just output the reference - */ - buf[len++] = '&'; -- while (len > buf_size - i - 10) { -+ while (len + i + 10 > buf_size) { - growBuffer(buf, i + 10); - } - for (;i > 0;i--) -@@ -3912,7 +3913,7 @@ xmlParseAttValueComplex(xmlParserCtxtPtr ctxt, int *attlen, int normalize) { - if ((len != 0) || (!normalize)) { - if ((!normalize) || (!in_space)) { - COPY_BUF(l,buf,len,0x20); -- while (len > buf_size - 10) { -+ while (len + 10 > buf_size) { - growBuffer(buf, 10); - } - } -@@ -3921,7 +3922,7 @@ xmlParseAttValueComplex(xmlParserCtxtPtr ctxt, int *attlen, int normalize) { - } else { - in_space = 0; - COPY_BUF(l,buf,len,c); -- if (len > buf_size - 10) { -+ if (len + 10 > buf_size) { - growBuffer(buf, 10); - } - } -@@ -3946,7 +3947,18 @@ xmlParseAttValueComplex(xmlParserCtxtPtr ctxt, int *attlen, int normalize) { - } - } else - NEXT; -- if (attlen != NULL) *attlen = len; -+ -+ /* -+ * There we potentially risk an overflow, don't allow attribute value of -+ * lenght more than INT_MAX it is a very reasonnable assumption ! -+ */ -+ if (len >= INT_MAX) { -+ xmlFatalErrMsg(ctxt, XML_ERR_ATTRIBUTE_NOT_FINISHED, -+ "AttValue lenght too long\n"); -+ goto mem_error; -+ } -+ -+ if (attlen != NULL) *attlen = (int) len; - return(buf); - - mem_error: --- Modified: ipcop/trunk/updates/2.1.0/ROOTFILES.i486-2.1.0 =================================================================== --- ipcop/trunk/updates/2.1.0/ROOTFILES.i486-2.1.0 2013-03-07 05:35:58 UTC (rev 6957) +++ ipcop/trunk/updates/2.1.0/ROOTFILES.i486-2.1.0 2013-03-11 11:42:52 UTC (rev 6958) @@ -457,9 +457,9 @@ /usr/lib/libusb-1.0.so.0 /usr/lib/libusb-1.0.so.0.1.0 ## -## libxml2-2.8.0 +## libxml2-2.9.0 /usr/lib/libxml2.so.2 -/usr/lib/libxml2.so.2.8.0 +/usr/lib/libxml2.so.2.9.0 ## ## logrotate-3.8.1 /usr/sbin/logrotate Modified: ipcop/trunk/updates/2.1.0/information.xml =================================================================== --- ipcop/trunk/updates/2.1.0/information.xml 2013-03-07 05:35:58 UTC (rev 6957) +++ ipcop/trunk/updates/2.1.0/information.xml 2013-03-11 11:42:52 UTC (rev 6958) @@ -15,7 +15,7 @@ hdparm to 9.39, httpd to 2.2.24, krb5 to 1.10.3, less to 451, libffi to 3.0.11, libgd to 2.0.36~rc1, libgcrypt to 1.5.0, libnet to 1.1.6, libnfnetlink to 1.0.1, libnetfiltercontrack to 1.0.2, libnl to 3.2.16, libpcap to 1.3.0, libpng to 1.5.14, - libusb to 1.0.9, libusb-compat to 0.1.4, libtool to 2.4.2, libxml2 to 2.8.0, logrotate to 3.8.1, lsof to 4.87, + libusb to 1.0.9, libusb-compat to 0.1.4, libtool to 2.4.2, libxml2 to 2.9.0, logrotate to 3.8.1, lsof to 4.87, mdadm to 3.2.6, net-tools to 1.60-p20120127084908, openldap to 2.4.33, openssh to 6.1, openssl to 1.0.1e, openswan to 2.6.38, parted to 3.1, pciutils to 3.1.10, pcre to 8.32, pixman to 0.24.4, procps to 3.3.6, psmisc to 22.20, rsyslog to 5.8.13, sed to 4.2.2, shadow to 4.1.5.1, smartmontools to 6.0, sqlite to 3.7.13 Modified: ipcop/trunk/updates/2.1.0/setup =================================================================== --- ipcop/trunk/updates/2.1.0/setup 2013-03-07 05:35:58 UTC (rev 6957) +++ ipcop/trunk/updates/2.1.0/setup 2013-03-11 11:42:52 UTC (rev 6958) @@ -145,7 +145,7 @@ /bin/rm -f /usr/lib/libpixman-1.so.0.22.2 /bin/rm -f /usr/lib/libpng15.so.15.{8,9,10,11,12}.0 /bin/rm -f /usr/lib/libusb-1.0.so.0.0.0 -/bin/rm -f /usr/lib/libxml2.so.2.7.8 +/bin/rm -f /usr/lib/libxml2.so.2.{7.8,8.0} # Remove devel lib that should not be needed /bin/rm -f /usr/lib/libatm.so This was sent by the SourceForge.net collaborative development platform, the world's largest Open Source development site. ------------------------------------------------------------------------------ Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester Wave(TM): Endpoint Security, Q1 2013 and "remains a good choice" in the endpoint security space. For insight on selecting the right partner to tackle endpoint security challenges, access the full report. http://p.sf.net/sfu/symantec-dev2dev _______________________________________________ Ipcop-svn mailing list Ipcop-svn@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/ipcop-svn