Path to this page:
./
emulators/suse131_base,
Linux compatibility package
Branch: pkgsrc-2014Q2,
Version: 13.1nb4,
Package name: suse_base-13.1nb4,
Maintainer: pkgsrc-usersLinux compatibility package based on the openSUSE Linux distribution.
Please visit http://www.opensuse.org/ for more information about openSUSE
Linux.
This package supports running ELF binaries linked with glibc2 that
don't require X11 shared libraries.
DEINSTALL [+/-]# $NetBSD: DEINSTALL,v 1.1 2013/12/05 11:42:14 obache Exp $
EMULDIR="${PKG_PREFIX}/@EMULSUBDIR@"
case "${STAGE}" in
DEINSTALL)
# Run any actions that require root privileges.
${TEST} ! -x ./+ROOT_ACTIONS ||
./+ROOT_ACTIONS REMOVE ${PKG_METADATA_DIR} || exit 1
# Blow away the /proc directory
${RMDIR} -p ${EMULDIR}/proc
# Remove some files created by pkgsrc.
${RM} -f ${EMULDIR}/etc/ld.so.cache
${RM} -f ${EMULDIR}/etc/mtab
${RM} -f ${EMULDIR}/etc/group
${RM} -f ${EMULDIR}/etc/gshadow
${RM} -f ${EMULDIR}/etc/passwd
${RM} -f ${EMULDIR}/etc/shadow
${RM} -f ${EMULDIR}/var/cache/ldconfig/aux-cache
${RM} -rf ${EMULDIR}/var/lock
;;
esac
MESSAGE.DragonFly [+/-]===========================================================================
$NetBSD: MESSAGE.DragonFly,v 1.1 2013/12/05 11:42:14 obache Exp $
Do not forget to include COMPAT_LINUX in your kernel configuration file.
You will also need to load the "linux.ko" kernel module (using kldload(8)
or by setting linux_enable=yes in /etc/rc.conf.
Most Linux binaries also require linprocfs to be mounted.
===========================================================================
MESSAGE.FreeBSD [+/-]===========================================================================
$NetBSD: MESSAGE.FreeBSD,v 1.1 2013/12/05 11:42:14 obache Exp $
Do not forget to include COMPAT_LINUX in your kernel configuration file.
You will also need to load the "linux.ko" kernel module (using kldload(8)
or by setting linux_enable=yes in /etc/rc.conf.
Most Linux binaries also require linprocfs to be mounted.
===========================================================================
MESSAGE.NetBSD [+/-]===========================================================================
$NetBSD: MESSAGE.NetBSD,v 1.1 2013/12/05 11:42:14 obache Exp $
Do not forget to include COMPAT_LINUX in your kernel configuration file.
Linux binaries require this option in order to work.
Most Linux binaries also require procfs to be mounted with -o linux.
This can be automated by adding the following to your /etc/fstab:
procfs /${EMULSUBDIR}/proc procfs ro,linux
Some Linux binaries also require tmpfs to be mounted on /dev/shm.
This can be automated by adding the following to your /etc/fstab:
tmpfs /${EMULSUBDIR}/dev/shm tmpfs rw,-m1777
===========================================================================
Master sites:
Version history: (Expand)
- (2014-07-11) Updated to version: suse_base-13.1nb4
- (2014-07-02) Package added to pkgsrc.se, version suse_base-13.1nb2 (created)
CVS history: (Expand)
2014-09-13 20:04:50 by Matthias Scheler | Files touched by this commit (1) |
Log message:
Fix pbulk problem caused by ticket #4497.
|
2014-09-11 21:16:33 by Matthias Scheler | Files touched by this commit (2) | |
Log message:
Pullup ticket #4497 - requested by obache
emulators/suse131_base: security update
Revisions pulled up:
- emulators/suse131_base/Makefile 1.9 via patch
- emulators/suse131_base/distinfo 1.7
---
Module Name: pkgsrc
Committed By: obache
Date: Thu Sep 11 09:28:51 UTC 2014
Modified Files:
pkgsrc/emulators/suse131_base: Makefile distinfo
Log message:
Bump suse131_base to nb5.
openSUSE Security Update: glibc
___________________________________________________________________________
___
Announcement ID: openSUSE-SU-2014:1115-1
Rating: important
References: #887022 #892073 #894553
Cross-References: CVE-2014-0475 CVE-2014-5119 CVE-2014-6040
Affected Products:
openSUSE 13.1
openSUSE 12.3
___________________________________________________________________________
___
An update that fixes three vulnerabilities is now available.
Description:
glibc was updated to fix three security issues:
- A directory traversal in locale environment handling was fixed
(CVE-2014-0475, bnc#887022, GLIBC BZ #17137)
- Disable gconv transliteration module loading which could be used for
code execution (CVE-2014-5119, bnc#892073, GLIBC BZ #17187)
- Fix crashes on invalid input in IBM gconv modules (CVE-2014-6040,
bnc#894553, BZ #17325)
|