Skip to navigation

Bug Fix Advisory glibc bugfix errata

Advisory: RHBA-2003:136-07
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2003-04-09
Last updated on: 2003-04-09
Affected Products: Red Hat Linux 9

Details

New glibc packages that fix a number of bugs are now available.

The glibc packages contain standard libraries that are used by many programs.

The following bugs have been fixed:

- A bug in pthread_cond_wait() which could cause programs hangs in some cases

- A bug in pthread_cond_timedwait() which could lead to crashes during
pthread_exit or thread cancellation

- Problems with destructors registered with pthread_key_create()

- glibc 2.0.x compatibility was missing

Users impacted by these bugs should upgrade to the updated glibc packages,
which resolve these problems.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Once the glibc upgrade has been completed, you must either reboot the
system, or restart all daemons and other programs to avoid having two
copies of the libraries mapped into memory and mixing old libraries with
new ones during dlopening.

Updated packages

Red Hat Linux 9

SRPMS:
glibc-2.3.2-27.9.src.rpm
File outdated by:  RHSA-2003:325
    MD5: 7cef2cd488a94ff21bfc25d4c0099d67
 
IA-32:
glibc-2.3.2-27.9.i386.rpm
File outdated by:  RHSA-2003:325
    MD5: 8fe9a661fd031b405d75a0e22a57925b
glibc-2.3.2-27.9.i686.rpm
File outdated by:  RHSA-2003:325
    MD5: 17698f5ff98d3cee2a72b2f206bc1589
glibc-common-2.3.2-27.9.i386.rpm
File outdated by:  RHSA-2003:325
    MD5: dc5b2aa636ff96c2ecfa144d373eac64
glibc-debug-2.3.2-27.9.i386.rpm
File outdated by:  RHSA-2003:325
    MD5: 24577ae50b4ae01391ab54fbaa385508
glibc-devel-2.3.2-27.9.i386.rpm
File outdated by:  RHSA-2003:325
    MD5: 780dda739f56779fa953df64ddaeaeff
glibc-profile-2.3.2-27.9.i386.rpm
File outdated by:  RHSA-2003:325
    MD5: c6efa89b8a37593b7e6ebca97beb6351
glibc-utils-2.3.2-27.9.i386.rpm
File outdated by:  RHSA-2003:325
    MD5: c5a336e38321ee79b97079ac6107e5f1
nptl-devel-2.3.2-27.9.i686.rpm
File outdated by:  RHSA-2003:325
    MD5: c548f573455445352dff879f3495f585
nscd-2.3.2-27.9.i386.rpm
File outdated by:  RHSA-2003:325
    MD5: 5fdfdb6fe5256b3cb8d2496ec780dc6a
 

Bugs fixed (see bugzilla for more information)

86339 - Update to glibc-2.3.2-4.80 breaks SSH
86437 - Glibc update breaks wine
86468 - crossover 1.2 does not work since export LD_ASSUME_KERNEL=2.2.5 workaround in glibc is missing. update 8.0 glibc
86534 - RedHat's glibc-2.3.2 and Samba -> assert_uid() failures?
87656 - LTC2324-Thread improperly loses lock on mutex when thread is cancelled.
88052 - register_printf_function() forgets to clear table
88056 - double free() from iofclose() on libio/tst-fopenloc
88093 - setcontext() is not signal safe
88099 - buffer underrun in read_input_file/gencat.c
88101 - using uninitialized local variable in math/test-tgmath
88104 - uinitialized variable used for __ieee754_gammal_r(NaN,)
88118 - buffer overrun in transit_state()/regexec.c
88219 - pthread_detach fails if thread has already exited


Keywords

glibc, linuxthreads, NPTL


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/