Bug Fix Advisory libdfp bugfix update

Advisory: RHBA-2011:0659-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-05-19
Last updated on: 2011-05-19
Affected Products: Red Hat Enterprise Linux Server Supplementary (v. 6)


Updated libdfp packages that fix various bugs are now available for Red Hat
Enterprise Linux 6.

The libdfp packages contain the Decimal Floating Point C Library, which is inter
alia used for converting strings into decimal floating point numbers.

The libdfp packages have been upgraded to upstream version 1.0.6, which provides
a number of bug fixes over the previous version. (BZ#642693)

Additionally, this update fixes the following bugs:

* Previously, converting a string into a decimal floating point number greater
than zero and less than one caused an error. During this conversion, the first
decimal digit disappeared; consequently all following computations were done
with wrong numbers. This bug has been fixed so that the conversion into the
decimal floating point number now works as expected. (BZ#625495)

* Under some circumstances, libdfp encountered an issue while converting a value
from a string into a decimal floating point number with the conversion command
"strtod32". The "strtod64" and "strtod128" commands, which are also included in
libdfp, did work correctly. The problem has been resolved so that the conversion
now proceeds properly. (BZ#628670)

* Previously, there were several testsuite failures encountered when building
the libdfp packages for the IBM S/390 architecture. These testsuite failures
have been corrected with this update and thus no longer occur. (BZ#673222)

All users requiring libdfp should upgrade to these updated packages, which fix
these bugs.


Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at

Updated packages

Red Hat Enterprise Linux Server Supplementary (v. 6)

libdfp-1.0.6-2.el6.src.rpm     MD5: 2ce062c1990d7b033416e8585e7c5e64
SHA-256: ecec08d677eacb3fa1dbf2e5604117f9d9b9d9234713474f203ac16165a9a4e4
libdfp-1.0.6-2.el6.ppc.rpm     MD5: dad0ba9d5c95bb2e199d72b8e4bd7bd7
SHA-256: 8c430d2592f4d90dfa51c8e5504b1d1ce0be315c0ec6de37921771d6d2872f80
libdfp-1.0.6-2.el6.ppc64.rpm     MD5: 79ee99a4f185f2dd0c91a834fcb2f3aa
SHA-256: 62623aae077a7fdffa2eba5428e22e5e96f5285bc3eb0614cfaec799575bdb93
libdfp-debuginfo-1.0.6-2.el6.ppc.rpm     MD5: e761c07c8eb4b5a9ec8a4a5c9e2a5523
SHA-256: 91526c83d90511505bd2b2f00ded58c7c6c5d21fd10cbb07fdff59fcf72f558c
libdfp-debuginfo-1.0.6-2.el6.ppc64.rpm     MD5: 9903f2079a2576fa628d61f27637e969
SHA-256: 91f2770a350d9f9765c229a0f0930267970ff42c317b930ca549aa760c9f915b
libdfp-devel-1.0.6-2.el6.ppc.rpm     MD5: cdc603d3c4976ab4d16f81905384737e
SHA-256: 1b6ca202f94c13edbf9ba159392737d0c3b4d8c03d8c76b80690be46939b5aec
libdfp-devel-1.0.6-2.el6.ppc64.rpm     MD5: 0aab01f2ebe06871ba9fc8e19a79a18e
SHA-256: 0fecf179401498bf1d5b15dc26e68ec2baf0d0464b5959d8076555473f2eaafb
libdfp-1.0.6-2.el6.s390.rpm     MD5: 1ab92c78a64435419bf1aa7817463666
SHA-256: f3757287a1bfb9c456fd2a63caa45568d8b7a47fc3831853fb24f358135012f6
libdfp-1.0.6-2.el6.s390x.rpm     MD5: d9cb5af945150f633cf1c1729aefe97c
SHA-256: 664410649381776610b2e69415a0ab40d8a2050e0de38d9b5184687b93ab945b
libdfp-debuginfo-1.0.6-2.el6.s390.rpm     MD5: a43b6ce1441dcea8abe4811c73143799
SHA-256: a1cfe8a9048eaf69edf6784a9989ce048b641d6571ad17ae0ced821b4e89b8d8
libdfp-debuginfo-1.0.6-2.el6.s390x.rpm     MD5: 895b297c21e174187db901501c904f61
SHA-256: 151db86727b12c578300e74423a2acd06318abebdf4865e75ec739b40330f36b
libdfp-devel-1.0.6-2.el6.s390.rpm     MD5: 1f122db439269390bb697a5d5f5d0287
SHA-256: 3f6e89ade82697d469572b1bf5e5c437581eff5496514522c1afd355ab83ca0e
libdfp-devel-1.0.6-2.el6.s390x.rpm     MD5: 4a99b0f8b8a0afd8b43b1f9489362d15
SHA-256: f7a4735ac25a9d2fe52bb224c2a70b13b2e77d6f8dadd45ca4e702af19507754
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

642693 - Rebase libdfp to pick up bug fixes and move out of tech preview
673222 - Fix libdfp 1.0.6 testsuite failures on s390 when using hardware support

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/