Skip to navigation

Bug Fix Advisory glibc bug fix update

Advisory: RHBA-2008:0083-3
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2008-05-21
Last updated on: 2008-05-21
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated glibc packages that fix several bugs and add various enhancements
are now available.

The GNU libc packages (known as glibc) contain the standard C libraries
used by applications.

These updated glibc packages provide fixes for the following bugs:

* threaded statically-linked binaries caused an error when attempting to
debug them with the gdb debugger.

* installation of glibc would fail when the /usr directory was on a
different partition than the / partition.

* getaddressinfo has been updated to treat optimistic addresses as
deprecated addresses, in accordance with RFC 4429.

* when using the si_LK locale, the GNOME panel's clock applet would show
the month of February incorrectly.

* a deadlock in the ld.so shared object library caused certain applications
such as Pulseaudio to hang.

* the clntudp_call() function would sporadically hang under certain conditions.

* when attempting to restart paranoia, the name service caching daemon
(nscd) would segfault whenever one of the caches was disabled.

* added an sfence instruction to x86_64 memset after the movnti instructions.

* iconv did not correctly translate certain characters into the
iso-2022-jp//translit encoding.

* the calloc() function would sometimes return non-zero-filled-buffers due
to an issue with madvise.

* in a multithreaded environment, the strerror() function caused a segfault
under certain circumstances.

* the sorting behavior of the getaddrinfo() function has been modified.
However, the getaddrinfo RFC3484 sorting changes are not enabled by default
for compatibility with Red Hat Enterprise Linux 5.0 and 5.1. To enable
better RFC3484-compliant behavior, the /etc/gai.conf configuration file
needs to be present and must contain at least one newly-supported scopev4
directive. Here is an example of such a scopev4 directive that should be
placed in /etc/gai.conf:

scopev4 ::ffff:169.254.0.0/112 2
scopev4 ::ffff:127.0.0.0/104 2
scopev4 ::ffff:10.0.0.0/104 5
scopev4 ::ffff:172.16.0.0/108 5
scopev4 ::ffff:192.168.0.0/112 5
scopev4 ::ffff:0.0.0.0/96 14

In addition, these updated packages provide the following enhancements:

* support has been added for an optimized memcpy string routine.

* password files in /etc/shadow can now be encrypted using the stronger
SHA-256 hash algorithm.

* support for the PowerPC-64 memset optimizations has been enabled.

Users are advised to upgrade to these updated glibc packages, which resolve
these issues and add these enhancements.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
glibc-2.5-24.src.rpm
File outdated by:  RHSA-2013:1411
    MD5: a77c1fe54226cfc1dbbef7363ecd7e9d
 
IA-32:
glibc-2.5-24.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 83a991ffa5080f001533e5aabf8b2255
glibc-2.5-24.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: bce81608dc409b98655093dcca648d25
glibc-common-2.5-24.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 821c8f3442f2f0c125323ffda2d1825a
glibc-devel-2.5-24.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 0f79baa51a8393dee5d0f5bdead9b780
glibc-headers-2.5-24.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: c9cb9f6f7ac6edfa5a9c925d0850f149
glibc-utils-2.5-24.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 2a5d569a4388977e4227f116bc8a40ae
nscd-2.5-24.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 37df1bcc12346f36fdee5f8e80342d10
 
IA-64:
glibc-2.5-24.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: bce81608dc409b98655093dcca648d25
glibc-2.5-24.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: ed9b744c741a973d09aa682e60d36f37
glibc-common-2.5-24.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 77f4bc446f564e521f753a21594bf71f
glibc-devel-2.5-24.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 735dea93db940b159ad8e14aaed0d59e
glibc-headers-2.5-24.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: fa9ae145adea35791a2e930ffe3a7a3e
glibc-utils-2.5-24.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: eeb548039eba059d1d0aa242a357c6ca
nscd-2.5-24.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: e16006b095e1dd70ad28b53156b427e4
 
PPC:
glibc-2.5-24.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 57a7502f9649beba6e59def4f724dfbd
glibc-2.5-24.ppc64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 5a7eb793505cd0118482a3c2713481b8
glibc-common-2.5-24.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 52cadf10249ec18c4b207d9779310e61
glibc-devel-2.5-24.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 0111488aa0e982e3266b34593c998b4f
glibc-devel-2.5-24.ppc64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 5be13384ef5407d51dce37cef61c797b
glibc-headers-2.5-24.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: c9576fae5292df77fa78358c8e898911
glibc-utils-2.5-24.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 6c5e6dabeba85b69e82495ef327a4cc8
nscd-2.5-24.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 86d62a99f62c50e862b1a502f2f8d38e
 
s390x:
glibc-2.5-24.s390.rpm
File outdated by:  RHSA-2013:1411
    MD5: 296f3757f08b6849b1c7f95e683bc250
glibc-2.5-24.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 6987b64e048012d0271c7bcc1013d473
glibc-common-2.5-24.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 934fff8fe7fb6de9a639fbb509d6dced
glibc-devel-2.5-24.s390.rpm
File outdated by:  RHSA-2013:1411
    MD5: 2012f4b355062cce800c6408bc91d828
glibc-devel-2.5-24.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 2e38462f2b8f7fa30b5b29ff05f522db
glibc-headers-2.5-24.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 153c08d59375194d6e581d4ffd28eb01
glibc-utils-2.5-24.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 4adf8b9dd2182347a67b6c744146a4fa
nscd-2.5-24.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 835ec80f2ab631a558bcf707967a3074
 
x86_64:
glibc-2.5-24.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: bce81608dc409b98655093dcca648d25
glibc-2.5-24.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: ab62fc1313b14af06a6bc1ecb23c95c9
glibc-common-2.5-24.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 43a39dbe2cd1fdea855ede329da87aa1
glibc-devel-2.5-24.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 0f79baa51a8393dee5d0f5bdead9b780
glibc-devel-2.5-24.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: f9c206a1deb28689c07308105c826e13
glibc-headers-2.5-24.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 501aa39690051aba6548c66043f751af
glibc-utils-2.5-24.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 607530dce86857e15ae6abeaa87b0250
nscd-2.5-24.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: fb4d1734a5611300b168ee8796bcae80
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
glibc-2.5-24.src.rpm
File outdated by:  RHSA-2013:1411
    MD5: a77c1fe54226cfc1dbbef7363ecd7e9d
 
IA-32:
glibc-2.5-24.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 83a991ffa5080f001533e5aabf8b2255
glibc-2.5-24.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: bce81608dc409b98655093dcca648d25
glibc-common-2.5-24.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 821c8f3442f2f0c125323ffda2d1825a
glibc-devel-2.5-24.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 0f79baa51a8393dee5d0f5bdead9b780
glibc-headers-2.5-24.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: c9cb9f6f7ac6edfa5a9c925d0850f149
glibc-utils-2.5-24.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 2a5d569a4388977e4227f116bc8a40ae
nscd-2.5-24.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 37df1bcc12346f36fdee5f8e80342d10
 
x86_64:
glibc-2.5-24.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: bce81608dc409b98655093dcca648d25
glibc-2.5-24.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: ab62fc1313b14af06a6bc1ecb23c95c9
glibc-common-2.5-24.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 43a39dbe2cd1fdea855ede329da87aa1
glibc-devel-2.5-24.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 0f79baa51a8393dee5d0f5bdead9b780
glibc-devel-2.5-24.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: f9c206a1deb28689c07308105c826e13
glibc-headers-2.5-24.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 501aa39690051aba6548c66043f751af
glibc-utils-2.5-24.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 607530dce86857e15ae6abeaa87b0250
nscd-2.5-24.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: fb4d1734a5611300b168ee8796bcae80
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

259681 - need to enhance getaddrinfo to support optimistic addresses
282201 - [si_LK]: gnome clock applet showing February month incorrectly
380751 - Shadow password encryption
397021 - Problems converting to iso-2022-jp//translit
405781 - calloc() broken when process address space is locked


Keywords

glibc


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/