From: bugzilla@redhat.com To: redhat-watch-list@redhat.com Subject: [RHBA-2001:121-06] GNU C Library bugfix update Date: Mon, 22 Oct 2001 09:00 -0400 --------------------------------------------------------------------- Red Hat, Inc. Red Hat Bug Fix Advisory Synopsis: GNU C Library bugfix update Advisory ID: RHBA-2001:121-06 Issue date: 2001-10-04 Updated on: 2001-10-19 Product: Red Hat Linux Keywords: glibc Cross references: Obsoletes: --------------------------------------------------------------------- 1. Topic: This errata fixes several bugs that have been discovered in glibc. Also, some optimizations have been added, including iconv cache and symbol lookup cache. 2001-10-22: Packages are now available for Red Hat Linux 7.2. The following bugs are fixed in the updates for Red Hat Linux 7.2: 43742 53394 53494 53984 All other bugs listed for this errata are not applicable to Red Hat Linux 7.2. 2. Relevant releases/architectures: Red Hat Linux 7.0 - alpha, alphaev6, i386, i686 Red Hat Linux 7.1 - alpha, alphaev6, i386, i686, ia64 Red Hat Linux 7.2 - i386, i686 3. Problem description: See the listed bug numbers or run rpm -qp --changelog glibc-2.2.4*.rpm for details. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. To update all RPMs for your particular architecture, run: rpm -Fvh [filenames] where [filenames] is a list of the RPMs you wish to upgrade. Only those RPMs which are currently installed will be updated. Those RPMs which are not installed but included in the list will not be updated. Note that you can also use wildcards (*.rpm) if your current directory *only* contains the desired RPMs. Please note that this update is also available via Red Hat Network. Many people find this to be an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 35968 - signal.h doesn't define struct sigcontext on ia64 36539 - sort goes into infinite loop with LC_ALL unset 37933 - incompatibility when C++ code is dynamically loaded into a process that is not a C++ program and subsequently throws an exception 39609 - Bad paths in xtrace 39803 - Informix onit crashes on startup in RH7.1 39138 - memusage is bad 39783 - locale name of utf8 for Japanese is wrong 39823 - memusage (from glibc-common-2.2.3-5) doesn't work 40244 - re_search_2 problem (probably miscompiled glibc) 42390 - Patch to make Linux XDR header files (in /usr/include/rpc) work with gcc -ansi 43210 - frexpl() returns unnormal numbers when given denormal input 43345 - ilogb(INFINITY) returns incorrect value 43346 - exp2(x) won't return denormal numbers 43347 - log2(-1) does not set errno 43348 - less crashes when searching for /< 43350 - llroundl(x) fails for certain values of x 43352 - tanhl(x) is incorrect when x is negative 43355 - coshl(x) fails when x >= 711 43681 - glibc v2.2.2 fails some self-tests 43742 - the pthreads library appears to become confused 44663 - nextafterl() produces incorrect result when 2nd argument is infinite 46446 - fflush(0) not thread safe 49308 - Max thread stack way too small for ia64 in glibc-2.2.x 50548 - glibc SIGSEGV in wcscoll() in "hr_HR.utf8" locale 50606 - Threads break memusage 50723 - strtod does not fully scan 50724 - scanf does not recognize signed infinities 51132 - telldir(), seekdir(), telldir() does not result in same location 52350 - ldconfig post-install errors 53394 - sigaction (SIGRTMIN) fails when linking with librt 53494 - timer_settime() dumps core if ovalue is NULL 53984 - /usr/include/bits/socket.h struct cmsghdr broken 6. RPMs required: Red Hat Linux 7.0: SRPMS: ftp://updates.redhat.com/7.0/en/os/SRPMS/glibc-2.2.4-18.7.0.src.rpm alpha: ftp://updates.redhat.com/7.0/en/os/alpha/glibc-2.2.4-18.7.0.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/glibc-common-2.2.4-18.7.0.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/glibc-devel-2.2.4-18.7.0.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/glibc-profile-2.2.4-18.7.0.alpha.rpm ftp://updates.redhat.com/7.0/en/os/alpha/nscd-2.2.4-18.7.0.alpha.rpm alphaev6: ftp://updates.redhat.com/7.0/en/os/alphaev6/glibc-2.2.4-18.7.0.alphaev6.rpm i386: ftp://updates.redhat.com/7.0/en/os/i386/glibc-2.2.4-18.7.0.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/glibc-common-2.2.4-18.7.0.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/glibc-devel-2.2.4-18.7.0.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/glibc-profile-2.2.4-18.7.0.i386.rpm ftp://updates.redhat.com/7.0/en/os/i386/nscd-2.2.4-18.7.0.i386.rpm i686: ftp://updates.redhat.com/7.0/en/os/i686/glibc-2.2.4-18.7.0.i686.rpm Red Hat Linux 7.1: SRPMS: ftp://updates.redhat.com/7.1/en/os/SRPMS/glibc-2.2.4-19.src.rpm alpha: ftp://updates.redhat.com/7.1/en/os/alpha/glibc-2.2.4-19.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/glibc-common-2.2.4-19.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/glibc-devel-2.2.4-19.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/glibc-profile-2.2.4-19.alpha.rpm ftp://updates.redhat.com/7.1/en/os/alpha/nscd-2.2.4-19.alpha.rpm alphaev6: ftp://updates.redhat.com/7.1/en/os/alphaev6/glibc-2.2.4-19.alphaev6.rpm i386: ftp://updates.redhat.com/7.1/en/os/i386/glibc-2.2.4-19.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/glibc-common-2.2.4-19.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/glibc-devel-2.2.4-19.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/glibc-profile-2.2.4-19.i386.rpm ftp://updates.redhat.com/7.1/en/os/i386/nscd-2.2.4-19.i386.rpm i686: ftp://updates.redhat.com/7.1/en/os/i686/glibc-2.2.4-19.i686.rpm ia64: ftp://updates.redhat.com/7.1/en/os/ia64/glibc-2.2.4-19.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/glibc-common-2.2.4-19.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/glibc-devel-2.2.4-19.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/glibc-profile-2.2.4-19.ia64.rpm ftp://updates.redhat.com/7.1/en/os/ia64/nscd-2.2.4-19.ia64.rpm Red Hat Linux 7.2: SRPMS: ftp://updates.redhat.com/7.2/en/os/SRPMS/glibc-2.2.4-19.src.rpm i386: ftp://updates.redhat.com/7.2/en/os/i386/glibc-2.2.4-19.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/glibc-common-2.2.4-19.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/glibc-devel-2.2.4-19.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/glibc-profile-2.2.4-19.i386.rpm ftp://updates.redhat.com/7.2/en/os/i386/nscd-2.2.4-19.i386.rpm i686: ftp://updates.redhat.com/7.2/en/os/i686/glibc-2.2.4-19.i686.rpm 7. Verification: MD5 sum Package Name -------------------------------------------------------------------------- f093a046faa313d94d07fdb41aa78393 7.0/en/os/SRPMS/glibc-2.2.4-18.7.0.src.rpm 2f9aa8be332b05bcd43dbd85bece5baa 7.0/en/os/alpha/glibc-2.2.4-18.7.0.alpha.rpm f227b41becfa60bbd87597f16fcfe01c 7.0/en/os/alpha/glibc-common-2.2.4-18.7.0.alpha.rpm 20eee2bb94a82051d9346474895e7205 7.0/en/os/alpha/glibc-devel-2.2.4-18.7.0.alpha.rpm b17bbde7cb937b2d775e217d90665d2d 7.0/en/os/alpha/glibc-profile-2.2.4-18.7.0.alpha.rpm e4c04f732b878384b12d58a62a0c6bdc 7.0/en/os/alpha/nscd-2.2.4-18.7.0.alpha.rpm a07da719b20fa7148a5e462e73c04cc2 7.0/en/os/alphaev6/glibc-2.2.4-18.7.0.alphaev6.rpm 19bae73a007fbbeae7f780daa31a7771 7.0/en/os/i386/glibc-2.2.4-18.7.0.i386.rpm 60b8547595110f983e4641366e89eeb0 7.0/en/os/i386/glibc-common-2.2.4-18.7.0.i386.rpm 424bf84a8e2eaea173bea18ef316c2a7 7.0/en/os/i386/glibc-devel-2.2.4-18.7.0.i386.rpm 5f48161b7488ab28386c875ae680d715 7.0/en/os/i386/glibc-profile-2.2.4-18.7.0.i386.rpm 58888ebede57ba5e3f5bbd02b56d4f72 7.0/en/os/i386/nscd-2.2.4-18.7.0.i386.rpm 5cabc4891e39b53daf3539f122b2f2d6 7.0/en/os/i686/glibc-2.2.4-18.7.0.i686.rpm 492b8d5832a795c2cf8e77eccbf45c9f 7.1/en/os/SRPMS/glibc-2.2.4-19.src.rpm 77ea4c9453c8ce2f39d6adace50331dc 7.1/en/os/alpha/glibc-2.2.4-19.alpha.rpm cb1d2489e86b6ef8f0da7bc9448a848d 7.1/en/os/alpha/glibc-common-2.2.4-19.alpha.rpm 7e7166cb29da124618b6715fd3a1464d 7.1/en/os/alpha/glibc-devel-2.2.4-19.alpha.rpm b6390bee8a1f0b09762f67c1ca1dcf36 7.1/en/os/alpha/glibc-profile-2.2.4-19.alpha.rpm 76fc4525d8cc862123806c21fe2c675f 7.1/en/os/alpha/nscd-2.2.4-19.alpha.rpm ddbf63295e0f9d18400f590f518402c1 7.1/en/os/alphaev6/glibc-2.2.4-19.alphaev6.rpm cfc7ef9f30eb41b3d28915f4266638dd 7.1/en/os/i386/glibc-2.2.4-19.i386.rpm 6c1cb0e295232aa75042f8fa669132f8 7.1/en/os/i386/glibc-common-2.2.4-19.i386.rpm 8fff17732c338939e167cd5afaf0e122 7.1/en/os/i386/glibc-devel-2.2.4-19.i386.rpm 13592a2f60619b17f3a4fa268fdcbf5b 7.1/en/os/i386/glibc-profile-2.2.4-19.i386.rpm f01d783c64c9a651434301bde28cffc3 7.1/en/os/i386/nscd-2.2.4-19.i386.rpm 9f41fb589348e7c6ec7f3666c76d6858 7.1/en/os/i686/glibc-2.2.4-19.i686.rpm fd183bc8c0f2f0c6331912d3b71b8ecc 7.1/en/os/ia64/glibc-2.2.4-19.ia64.rpm cbf7bba55f4baa0c1d133aea570dadeb 7.1/en/os/ia64/glibc-common-2.2.4-19.ia64.rpm d7bad64507afdd84d7a7d0d5986a9829 7.1/en/os/ia64/glibc-devel-2.2.4-19.ia64.rpm b9a2f3d9d98ec33c66bcc41b87d9723f 7.1/en/os/ia64/glibc-profile-2.2.4-19.ia64.rpm f83934b33ecb6433a8e04f650b97a284 7.1/en/os/ia64/nscd-2.2.4-19.ia64.rpm 492b8d5832a795c2cf8e77eccbf45c9f 7.2/en/os/SRPMS/glibc-2.2.4-19.src.rpm cfc7ef9f30eb41b3d28915f4266638dd 7.2/en/os/i386/glibc-2.2.4-19.i386.rpm 6c1cb0e295232aa75042f8fa669132f8 7.2/en/os/i386/glibc-common-2.2.4-19.i386.rpm 8fff17732c338939e167cd5afaf0e122 7.2/en/os/i386/glibc-devel-2.2.4-19.i386.rpm 13592a2f60619b17f3a4fa268fdcbf5b 7.2/en/os/i386/glibc-profile-2.2.4-19.i386.rpm f01d783c64c9a651434301bde28cffc3 7.2/en/os/i386/nscd-2.2.4-19.i386.rpm 9f41fb589348e7c6ec7f3666c76d6858 7.2/en/os/i686/glibc-2.2.4-19.i686.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/about/contact/pgpkey.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: Copyright(c) 2000, 2001 Red Hat, Inc. _______________________________________________ Redhat-watch-list mailing list To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list