Skip to navigation

Bug Fix Advisory glibc bug fix and enhancement update

Advisory: RHBA-2011:0109-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-01-13
Last updated on: 2011-01-13
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated glibc packages that fix several bugs and add an enhancement are now
available for Red Hat Enterprise Linux 5.

The glibc packages contain the standard C libraries used by multiple programs on
the system. These packages contain the standard C and the standard math
libraries. Without these two libraries, the Linux system cannot function
properly.

These updated glibc packages provide fixes for the following bugs:

* Executing the 'memusage' command (provided by the memusage utility, which is a
part of the glibc-devel package) could cause a segmentation fault. This update
fixes the found deficiency and the 'memusage' command works as expected.
(BZ#531576)

* Prior to this update, a DNS resolver could fail to report an appropriate error
when the supplied buffer was too small. This resulted in a truncated response
instead of asking the caller to resize the buffer and try again. With this
update, small buffers are handled correctly and the DNS resolver no longer
fails. (BZ#533367)

* A deadlock that could cause an application to hang could occur when the
'dlclose' function was called. This resulted in the cancellation of a thread.
With this update, a deadlock no longer occurs when calling the 'dlclose'
function. (BZ#549813)

* This update limits the amount of stack usage when adding an environment
variable with a long name or value. (BZ#559974)

* Submitting an AIO (Asynchronous Input/Output) write request requires a
creation of a helper thread to handle the request. If the creation of this
thread failed, a corruption of the glibc internal data structures could occur.
This resulted in a crash when the next AIO request was submitted. This update
corrects this issue by making sure the internal data structures remain
consistent. (BZ#566712)

* Previously, there was an error in the POWER6 implementation of the 'memcpy'
and 'memset' functions. As a result, using Concurrent Versions System (CVS) with
Kerberos authentication on the 32-bit PowerPC architecture may have failed with
a segmentation fault. This error has been fixed, and both 'memcpy' and 'memset'
functions now work as expected. (BZ#579011)

* Due to a race in the 'free()' function, enabling 'MALLOC_CHECK_' could cause a
segmentation fault. This update adds proper locking in the 'free()' function to
prevent the aforementioned segmentation fault. (BZ#585674)

* Under certain conditions, cancellation of a thread did not invoke a cleanup
handler. This update adds more complete information to the unwind library for
glibc, thus, when canceling a thread, a cleanup handler is invoked before the
thread is terminated under all circumstances. (BZ#593047)

* Under certain circumstances, unloading a module could leave the remaining
modules' symbol search list in an inconsistent state. Consequent to this
inconsistency, symbol lookups could spuriously fail to find the symbol. This
update corrects this: module unloading no longer produces inconsistent state in
the symbol search list. (BZ#593675)

* Previously, pattern matching of specific digraphs was not consistent across
all architectures. This was caused by a misinterpretation of the locale's
collation information. With this update, the digraphs are correctly recognized
and properly collated. (BZ#601294)

* A race condition between module loading and stack unwinding could result in a
crash. With this update, a crash no longer occurs in the aforementioned case.
(BZ#649956)

In addition, these updated glibc packages provide the following enhancement:

* The name service cache daemon (nscd) now prepends a timestamp to its log
messages. (BZ#527558)

* Support for POWER7 and Power ISA v.2.06 architectures has been added.
(BZ#563563), (BZ#563599)

Users are advised to upgrade to these updated glibc packages, which resolve
these issues and add this enhancement.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
glibc-2.5-58.src.rpm
File outdated by:  RHSA-2013:1411
    MD5: 86719630d6a1fcb544db30a6db00ca6a
SHA-256: 1a5759d2ae82921a9d57b7e45d8df76fe1eff7a9e6beb97a58949356acd2b4d7
 
IA-32:
glibc-2.5-58.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 86206f28e7a3482e1599c06a4dd86b37
SHA-256: 4a30831299887498446a4cb4890e7bcf5d0ea457cac47e33d367694044767684
glibc-2.5-58.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: 549acbbe2b53a3c24fc83095d0fb1478
SHA-256: 87efac6a59274f24468bb3080bdd8ec38c6ef6b1221e10e37b9bea1494de0e87
glibc-common-2.5-58.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 07cc4475f79496bec59b01e80ab87b1e
SHA-256: 326db6ab54e787304e172f84bade2d3dd5c05930b2ce343193a4cef4801e5de0
glibc-devel-2.5-58.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 308cec55502725dcb55ec43829b7cbd0
SHA-256: b69c3e4e9cf0999a0738e4f0b61dfea62207cab9951a7e12f0e4fcd01e68b9e9
glibc-headers-2.5-58.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 7a8544984cbeba5a2794877488671d4d
SHA-256: d8c1974983262a732d98e9a9322f8078e17e832b2fe98a26b16831b96fb9f89b
glibc-utils-2.5-58.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 7ef7e0eca901efac1fa43fc41fd6cc55
SHA-256: e623b00163d7bc8686fe7a02b8688e8b156fd7b7ca0b7e155722a97c3fd94801
nscd-2.5-58.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 7d02cc075ec4fb056e79fb72a2ed73a2
SHA-256: 9db1481f852143bb5a278e4bbe7afbd40bb9734c17b0962279eb9cddd38d9a54
 
IA-64:
glibc-2.5-58.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: 549acbbe2b53a3c24fc83095d0fb1478
SHA-256: 87efac6a59274f24468bb3080bdd8ec38c6ef6b1221e10e37b9bea1494de0e87
glibc-2.5-58.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: dc3120fc91d879ec76c1d8ddd4fbb5c9
SHA-256: 94965fbc48d24d4bc130be73473fa7c1d3b2c32b7e84705cb907395ea27a003c
glibc-common-2.5-58.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: d896c614f34d2af4c62446a610bb4ee1
SHA-256: 74ccc5c33a9950dd46acf650c40da81c4ae0f7577bc761951d12b48965883f1d
glibc-devel-2.5-58.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 0861268ff798d637d92901b8770089f1
SHA-256: 44cb04ba1c3ec7e9545476ae72f26e4ef2919b12a923c515e5667a3df267869c
glibc-headers-2.5-58.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: f7e70187abd553d1a5252c0b83f95d9e
SHA-256: 77886931d0c47f821f4c5366d537e5b5b7189489153c3163e54f508db680ef2e
glibc-utils-2.5-58.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: f3ef47b3ce368c827434f5a9a744ec2b
SHA-256: f1089d61ffccb9d25a19469a2833414ff3ba9c69a5570c6e5276a60a5946f380
nscd-2.5-58.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 07590173b429f20c941c38a5195b3c07
SHA-256: 5d49fb8d3306222e1e407addf74ee8640cde208fda4258733304ef8d971941a7
 
PPC:
glibc-2.5-58.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: e9fb10da1ff47865de2eb172b414a954
SHA-256: 5ce4caa7ce3ee6f3eeaa11bcc5bf32cb4737702d0de529bba288ae39819e54b2
glibc-2.5-58.ppc64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 8d366f2e3b2027a1574aea11477453af
SHA-256: a1dd8710a248b57e1e5d3c3669fe8890b894736b257c32d81a65bdb64793a321
glibc-common-2.5-58.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: a411039d4e86419b85a324e9d0039ea2
SHA-256: 5e7f612fefef7ef66b22bfa49fd3e60b973d62dd704a234b77e3220b57b73c8d
glibc-devel-2.5-58.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: fae8989b64f2a105b9d86387de001c76
SHA-256: e227ae50b17113a521afeb41c44fa274648455b56d26f0d61ca6549612765577
glibc-devel-2.5-58.ppc64.rpm
File outdated by:  RHSA-2013:1411
    MD5: c0a070a09c31a17d327332e6d989f9e6
SHA-256: 6cf0a0134569f4ca4ac34b47f156b397cb2566d57fd48d14e60e9bff9c6c2b6f
glibc-headers-2.5-58.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 5c2e961e6acd7f82c027b66ee9958e58
SHA-256: 0f1b15bc14b9b1ac983cbc5ae38b2fb2e9bc8486558e25acf8148ada379fdc5e
glibc-utils-2.5-58.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 8ccfa9ab571b02043d781c6723d93a90
SHA-256: f5ddf49f09e8cdf7d1dc7f6278f03e85beedb1763d1b5fedf3276f75e5198168
nscd-2.5-58.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 0aa1984f16cec9f3e3100ddbeb5da2e1
SHA-256: 2ee4bd95e4a0fcd1de0f4094b818f1eaafd9093782dafd6049f94b935bcaa4e0
 
s390x:
glibc-2.5-58.s390.rpm
File outdated by:  RHSA-2013:1411
    MD5: a2a2638c0bbf93c7929806c17986ac56
SHA-256: be93081c4fa8d05183a17fe8431e0173394da0c6adade7252dc1780c1bc41f40
glibc-2.5-58.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: aba8db1dd4ef435806038251745b74aa
SHA-256: 07ed5b16a15223c5dc069008ef3398e458080c9ee4bf921a1d46dfcba0fd5724
glibc-common-2.5-58.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 82ec9a4798b45842d64a4fb9241cf20a
SHA-256: 4be08fe93c468593e47ccd6cfc5deadba822e8dc080f54239c191f206370655d
glibc-devel-2.5-58.s390.rpm
File outdated by:  RHSA-2013:1411
    MD5: 1a2b8ea83481d6c7653d383439dc7f49
SHA-256: d61b8ab45173eb4d4311a902e78597375e130ff9d5e1781abb128cca8e664b63
glibc-devel-2.5-58.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: d89adedef83395d2b28aa87fdde98b53
SHA-256: 2031953a1193fc1e741e3c8dbaec4b698fd7d2ad48294c160f9961ba8f42ca16
glibc-headers-2.5-58.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 5267f7ec4f945476aacc73e8c7db673b
SHA-256: 336383107aa154f9dc150e72b788eda0fc8aa9552db61e00a3a9c1882db7760f
glibc-utils-2.5-58.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 7854543bbaf786364dcc9a783fa31451
SHA-256: bf982dfc3d5bf3c4d04ff7f8e5f7e0b5e20126f0f29ecea4dc18963acb3dd08b
nscd-2.5-58.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 235e55cac771ae2575a65518d5cac9b0
SHA-256: eb645bfd5367396ae8bd76c2770dd7cd5c5c31b81be922e41999407f9575d661
 
x86_64:
glibc-2.5-58.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: 549acbbe2b53a3c24fc83095d0fb1478
SHA-256: 87efac6a59274f24468bb3080bdd8ec38c6ef6b1221e10e37b9bea1494de0e87
glibc-2.5-58.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 985e05e5f45a8bd4d3261045a2c1431a
SHA-256: 09821b1d86e0f02c22939e38d6130c45c32ea437ada17331ce0733ca81dc36ba
glibc-common-2.5-58.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: e45ff3677a660ae9f7448a6436ebf7ef
SHA-256: 08955623f4871d3d1f77a6f3f160c5f4dbd33c46758ec702cbf0d42e8841b99b
glibc-devel-2.5-58.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 308cec55502725dcb55ec43829b7cbd0
SHA-256: b69c3e4e9cf0999a0738e4f0b61dfea62207cab9951a7e12f0e4fcd01e68b9e9
glibc-devel-2.5-58.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 72b51bffcb96af0ed1cb6ef0b0c2a7c3
SHA-256: 101844570048cbaba972616a9e7a86dfa30a7582dca865b56d25ccf3f94d82ae
glibc-headers-2.5-58.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: b0a7f8834f45e914c76e18ceac378cfd
SHA-256: aac27f6caa5b3ae0110c618d90e2b0f9513a217f2bf925eaa2f4157a5cb6cd36
glibc-utils-2.5-58.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: f729262e0b9549d01cffd951aedac86b
SHA-256: b9a2fccdd1d4e5cc787280b6451e92ba1e9a7bb165346a6f8c298e5041d78799
nscd-2.5-58.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: c2615dc61d799d5cbe8cf5e1648f9aa4
SHA-256: 1517b6379e39ac43cd2c4940bb8e81442a50118a543402cf2477f6d113ca3818
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
glibc-2.5-58.src.rpm
File outdated by:  RHSA-2013:1411
    MD5: 86719630d6a1fcb544db30a6db00ca6a
SHA-256: 1a5759d2ae82921a9d57b7e45d8df76fe1eff7a9e6beb97a58949356acd2b4d7
 
IA-32:
glibc-2.5-58.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 86206f28e7a3482e1599c06a4dd86b37
SHA-256: 4a30831299887498446a4cb4890e7bcf5d0ea457cac47e33d367694044767684
glibc-2.5-58.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: 549acbbe2b53a3c24fc83095d0fb1478
SHA-256: 87efac6a59274f24468bb3080bdd8ec38c6ef6b1221e10e37b9bea1494de0e87
glibc-common-2.5-58.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 07cc4475f79496bec59b01e80ab87b1e
SHA-256: 326db6ab54e787304e172f84bade2d3dd5c05930b2ce343193a4cef4801e5de0
glibc-devel-2.5-58.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 308cec55502725dcb55ec43829b7cbd0
SHA-256: b69c3e4e9cf0999a0738e4f0b61dfea62207cab9951a7e12f0e4fcd01e68b9e9
glibc-headers-2.5-58.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 7a8544984cbeba5a2794877488671d4d
SHA-256: d8c1974983262a732d98e9a9322f8078e17e832b2fe98a26b16831b96fb9f89b
glibc-utils-2.5-58.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 7ef7e0eca901efac1fa43fc41fd6cc55
SHA-256: e623b00163d7bc8686fe7a02b8688e8b156fd7b7ca0b7e155722a97c3fd94801
nscd-2.5-58.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 7d02cc075ec4fb056e79fb72a2ed73a2
SHA-256: 9db1481f852143bb5a278e4bbe7afbd40bb9734c17b0962279eb9cddd38d9a54
 
x86_64:
glibc-2.5-58.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: 549acbbe2b53a3c24fc83095d0fb1478
SHA-256: 87efac6a59274f24468bb3080bdd8ec38c6ef6b1221e10e37b9bea1494de0e87
glibc-2.5-58.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 985e05e5f45a8bd4d3261045a2c1431a
SHA-256: 09821b1d86e0f02c22939e38d6130c45c32ea437ada17331ce0733ca81dc36ba
glibc-common-2.5-58.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: e45ff3677a660ae9f7448a6436ebf7ef
SHA-256: 08955623f4871d3d1f77a6f3f160c5f4dbd33c46758ec702cbf0d42e8841b99b
glibc-devel-2.5-58.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 308cec55502725dcb55ec43829b7cbd0
SHA-256: b69c3e4e9cf0999a0738e4f0b61dfea62207cab9951a7e12f0e4fcd01e68b9e9
glibc-devel-2.5-58.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 72b51bffcb96af0ed1cb6ef0b0c2a7c3
SHA-256: 101844570048cbaba972616a9e7a86dfa30a7582dca865b56d25ccf3f94d82ae
glibc-headers-2.5-58.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: b0a7f8834f45e914c76e18ceac378cfd
SHA-256: aac27f6caa5b3ae0110c618d90e2b0f9513a217f2bf925eaa2f4157a5cb6cd36
glibc-utils-2.5-58.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: f729262e0b9549d01cffd951aedac86b
SHA-256: b9a2fccdd1d4e5cc787280b6451e92ba1e9a7bb165346a6f8c298e5041d78799
nscd-2.5-58.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: c2615dc61d799d5cbe8cf5e1648f9aa4
SHA-256: 1517b6379e39ac43cd2c4940bb8e81442a50118a543402cf2477f6d113ca3818
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

527558 - [RHEL5] add timestamps to nscd logs
531576 - [RHEL5] memusage cmd segfaults if run on a perl script that has 'use' in it
533367 - [RHEL5] Segfault after DNS name resolution
549813 - dl_close() race with C++ destructor
559974 - glibc: Don't limit the length of exported environment variable
563563 - Backport sysdeps/powerpc/dl-procinfo.c power7 & ISA 2.06 support
563599 - [5.6 FEAT] Backport elf/dl-sysdep.c patch for AT_BASE_PLATFORM
566712 - If pthread_create fails in aio_write, requests linked list is corrupted
579011 - cvs with kerberos authentification segfaults
585674 - free() race in mcheck hooks
593047 - pthread cleanup handler is not invoked during thread cancellation
593675 - [5.4] Unexpected failure of resolving a locally-defined symbol.


Keywords

glibc


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/