[LWN Logo]
[LWN.net]
From:	 bugzilla@redhat.com
To:	 redhat-watch-list@redhat.com
Subject: [RHBA-2001:121-06] GNU C Library bugfix update
Date:	 Mon, 22 Oct 2001 09:00 -0400

---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Bug Fix Advisory

Synopsis:          GNU C Library bugfix update
Advisory ID:       RHBA-2001:121-06
Issue date:        2001-10-04
Updated on:        2001-10-19
Product:           Red Hat Linux
Keywords:          glibc
Cross references:  
Obsoletes:         
---------------------------------------------------------------------

1. Topic:

This errata fixes several bugs that have been discovered in glibc.
Also, some optimizations have been added, including iconv cache and
symbol lookup cache.

2001-10-22: Packages are now available for Red Hat Linux 7.2. The following
bugs are fixed in the updates for Red Hat Linux 7.2:
  43742 53394 53494 53984
All other bugs listed for this errata are not applicable to Red Hat Linux 7.2.

2. Relevant releases/architectures:

Red Hat Linux 7.0 - alpha, alphaev6, i386, i686

Red Hat Linux 7.1 - alpha, alphaev6, i386, i686, ia64

Red Hat Linux 7.2 - i386, i686

3. Problem description:

See the listed bug numbers or run rpm -qp --changelog glibc-2.2.4*.rpm
for details.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this to be an easier way to apply updates.  To use Red Hat
Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

35968 - signal.h doesn't define struct sigcontext on ia64
36539 - sort goes into infinite loop with LC_ALL unset
37933 - incompatibility when C++ code is dynamically loaded into a process that is not a C++ program and subsequently throws an exception
39609 - Bad paths in xtrace
39803 - Informix onit crashes on startup in RH7.1
39138 - memusage is bad
39783 - locale name of utf8 for Japanese is wrong
39823 - memusage (from glibc-common-2.2.3-5) doesn't work
40244 - re_search_2 problem (probably miscompiled glibc)
42390 - Patch to make Linux XDR header files (in /usr/include/rpc) work with gcc -ansi
43210 - frexpl() returns unnormal numbers when given denormal input
43345 - ilogb(INFINITY) returns incorrect value
43346 - exp2(x) won't return denormal numbers
43347 - log2(-1) does not set errno
43348 - less crashes when searching for /<
43350 - llroundl(x) fails for certain values of x
43352 - tanhl(x) is incorrect when x is negative
43355 - coshl(x) fails when x >= 711
43681 - glibc v2.2.2 fails some self-tests
43742 - the pthreads library appears to become confused
44663 - nextafterl() produces incorrect result when 2nd argument is infinite
46446 - fflush(0) not thread safe
49308 - Max thread stack way too small for ia64 in glibc-2.2.x
50548 - glibc SIGSEGV in wcscoll() in "hr_HR.utf8" locale
50606 - Threads break memusage
50723 - strtod does not fully scan
50724 - scanf does not recognize signed infinities
51132 - telldir(), seekdir(), telldir() does not result in same location
52350 - ldconfig post-install errors
53394 - sigaction (SIGRTMIN) fails when linking with librt
53494 - timer_settime() dumps core if ovalue is NULL
53984 - /usr/include/bits/socket.h struct cmsghdr broken

6. RPMs required:

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/glibc-2.2.4-18.7.0.src.rpm

alpha:
ftp://updates.redhat.com/7.0/en/os/alpha/glibc-2.2.4-18.7.0.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/glibc-common-2.2.4-18.7.0.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/glibc-devel-2.2.4-18.7.0.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/glibc-profile-2.2.4-18.7.0.alpha.rpm
ftp://updates.redhat.com/7.0/en/os/alpha/nscd-2.2.4-18.7.0.alpha.rpm

alphaev6:
ftp://updates.redhat.com/7.0/en/os/alphaev6/glibc-2.2.4-18.7.0.alphaev6.rpm

i386:
ftp://updates.redhat.com/7.0/en/os/i386/glibc-2.2.4-18.7.0.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/glibc-common-2.2.4-18.7.0.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/glibc-devel-2.2.4-18.7.0.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/glibc-profile-2.2.4-18.7.0.i386.rpm
ftp://updates.redhat.com/7.0/en/os/i386/nscd-2.2.4-18.7.0.i386.rpm

i686:
ftp://updates.redhat.com/7.0/en/os/i686/glibc-2.2.4-18.7.0.i686.rpm

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/glibc-2.2.4-19.src.rpm

alpha:
ftp://updates.redhat.com/7.1/en/os/alpha/glibc-2.2.4-19.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/glibc-common-2.2.4-19.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/glibc-devel-2.2.4-19.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/glibc-profile-2.2.4-19.alpha.rpm
ftp://updates.redhat.com/7.1/en/os/alpha/nscd-2.2.4-19.alpha.rpm

alphaev6:
ftp://updates.redhat.com/7.1/en/os/alphaev6/glibc-2.2.4-19.alphaev6.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/glibc-2.2.4-19.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/glibc-common-2.2.4-19.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/glibc-devel-2.2.4-19.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/glibc-profile-2.2.4-19.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/nscd-2.2.4-19.i386.rpm

i686:
ftp://updates.redhat.com/7.1/en/os/i686/glibc-2.2.4-19.i686.rpm

ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/glibc-2.2.4-19.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/glibc-common-2.2.4-19.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/glibc-devel-2.2.4-19.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/glibc-profile-2.2.4-19.ia64.rpm
ftp://updates.redhat.com/7.1/en/os/ia64/nscd-2.2.4-19.ia64.rpm

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/glibc-2.2.4-19.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/glibc-2.2.4-19.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/glibc-common-2.2.4-19.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/glibc-devel-2.2.4-19.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/glibc-profile-2.2.4-19.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/nscd-2.2.4-19.i386.rpm

i686:
ftp://updates.redhat.com/7.2/en/os/i686/glibc-2.2.4-19.i686.rpm



7. Verification:

MD5 sum                           Package Name
--------------------------------------------------------------------------
f093a046faa313d94d07fdb41aa78393 7.0/en/os/SRPMS/glibc-2.2.4-18.7.0.src.rpm
2f9aa8be332b05bcd43dbd85bece5baa 7.0/en/os/alpha/glibc-2.2.4-18.7.0.alpha.rpm
f227b41becfa60bbd87597f16fcfe01c 7.0/en/os/alpha/glibc-common-2.2.4-18.7.0.alpha.rpm
20eee2bb94a82051d9346474895e7205 7.0/en/os/alpha/glibc-devel-2.2.4-18.7.0.alpha.rpm
b17bbde7cb937b2d775e217d90665d2d 7.0/en/os/alpha/glibc-profile-2.2.4-18.7.0.alpha.rpm
e4c04f732b878384b12d58a62a0c6bdc 7.0/en/os/alpha/nscd-2.2.4-18.7.0.alpha.rpm
a07da719b20fa7148a5e462e73c04cc2 7.0/en/os/alphaev6/glibc-2.2.4-18.7.0.alphaev6.rpm
19bae73a007fbbeae7f780daa31a7771 7.0/en/os/i386/glibc-2.2.4-18.7.0.i386.rpm
60b8547595110f983e4641366e89eeb0 7.0/en/os/i386/glibc-common-2.2.4-18.7.0.i386.rpm
424bf84a8e2eaea173bea18ef316c2a7 7.0/en/os/i386/glibc-devel-2.2.4-18.7.0.i386.rpm
5f48161b7488ab28386c875ae680d715 7.0/en/os/i386/glibc-profile-2.2.4-18.7.0.i386.rpm
58888ebede57ba5e3f5bbd02b56d4f72 7.0/en/os/i386/nscd-2.2.4-18.7.0.i386.rpm
5cabc4891e39b53daf3539f122b2f2d6 7.0/en/os/i686/glibc-2.2.4-18.7.0.i686.rpm
492b8d5832a795c2cf8e77eccbf45c9f 7.1/en/os/SRPMS/glibc-2.2.4-19.src.rpm
77ea4c9453c8ce2f39d6adace50331dc 7.1/en/os/alpha/glibc-2.2.4-19.alpha.rpm
cb1d2489e86b6ef8f0da7bc9448a848d 7.1/en/os/alpha/glibc-common-2.2.4-19.alpha.rpm
7e7166cb29da124618b6715fd3a1464d 7.1/en/os/alpha/glibc-devel-2.2.4-19.alpha.rpm
b6390bee8a1f0b09762f67c1ca1dcf36 7.1/en/os/alpha/glibc-profile-2.2.4-19.alpha.rpm
76fc4525d8cc862123806c21fe2c675f 7.1/en/os/alpha/nscd-2.2.4-19.alpha.rpm
ddbf63295e0f9d18400f590f518402c1 7.1/en/os/alphaev6/glibc-2.2.4-19.alphaev6.rpm
cfc7ef9f30eb41b3d28915f4266638dd 7.1/en/os/i386/glibc-2.2.4-19.i386.rpm
6c1cb0e295232aa75042f8fa669132f8 7.1/en/os/i386/glibc-common-2.2.4-19.i386.rpm
8fff17732c338939e167cd5afaf0e122 7.1/en/os/i386/glibc-devel-2.2.4-19.i386.rpm
13592a2f60619b17f3a4fa268fdcbf5b 7.1/en/os/i386/glibc-profile-2.2.4-19.i386.rpm
f01d783c64c9a651434301bde28cffc3 7.1/en/os/i386/nscd-2.2.4-19.i386.rpm
9f41fb589348e7c6ec7f3666c76d6858 7.1/en/os/i686/glibc-2.2.4-19.i686.rpm
fd183bc8c0f2f0c6331912d3b71b8ecc 7.1/en/os/ia64/glibc-2.2.4-19.ia64.rpm
cbf7bba55f4baa0c1d133aea570dadeb 7.1/en/os/ia64/glibc-common-2.2.4-19.ia64.rpm
d7bad64507afdd84d7a7d0d5986a9829 7.1/en/os/ia64/glibc-devel-2.2.4-19.ia64.rpm
b9a2f3d9d98ec33c66bcc41b87d9723f 7.1/en/os/ia64/glibc-profile-2.2.4-19.ia64.rpm
f83934b33ecb6433a8e04f650b97a284 7.1/en/os/ia64/nscd-2.2.4-19.ia64.rpm
492b8d5832a795c2cf8e77eccbf45c9f 7.2/en/os/SRPMS/glibc-2.2.4-19.src.rpm
cfc7ef9f30eb41b3d28915f4266638dd 7.2/en/os/i386/glibc-2.2.4-19.i386.rpm
6c1cb0e295232aa75042f8fa669132f8 7.2/en/os/i386/glibc-common-2.2.4-19.i386.rpm
8fff17732c338939e167cd5afaf0e122 7.2/en/os/i386/glibc-devel-2.2.4-19.i386.rpm
13592a2f60619b17f3a4fa268fdcbf5b 7.2/en/os/i386/glibc-profile-2.2.4-19.i386.rpm
f01d783c64c9a651434301bde28cffc3 7.2/en/os/i386/nscd-2.2.4-19.i386.rpm
9f41fb589348e7c6ec7f3666c76d6858 7.2/en/os/i686/glibc-2.2.4-19.i686.rpm

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

8. References:




Copyright(c) 2000, 2001 Red Hat, Inc.



_______________________________________________
Redhat-watch-list mailing list
To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list