Skip to navigation

Bug Fix Advisory glibc bug fix update

Advisory: RHBA-2010:0450-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-06-02
Last updated on: 2010-06-02
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated glibc packages that fix two bugs are now available.

The glibc packages contain the standard C libraries used by multiple
programs on the system. These packages contain the standard C and the
standard math libraries. Without these two libraries, the Linux system
cannot function properly.

This update applies the following bug fixes:

* submitting an AIO write request initially requires creating a helper
thread to handle the request. If the creation of this thread fails, a
corruption of glibc internal data structures can result which can cause a
crash when the next AIO request is submitted. This update corrects this by
making sure the internal structures remain consistent. (BZ#589871)

* missing unwind information can cause pthread cleanup handlers to be
missed when a thread is canceled. This update adds unwind information to
all functions in the standard C library, even on platforms that do not emit
such information by default. (BZ#593047)

All users are advised to upgrade to these updated packages, which resolve
these issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
glibc-2.5-49.el5_5.2.src.rpm
File outdated by:  RHSA-2013:1411
    MD5: b2eddbb78d503c25816a3a9888175be6
SHA-256: 705c40bce17628467b01aa270373902fb5359733c4d280d622dc9c89875fcc0c
 
IA-32:
glibc-2.5-49.el5_5.2.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 47cf3f51909efda24e47e3035f38d3c7
SHA-256: bd6ab7205bf24af5f986055e80ef4344b0dc410d08fcabdcecf8748a46fee0ae
glibc-2.5-49.el5_5.2.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: 317e5bd3d7c9c19420e4dd9f9eab5f2f
SHA-256: 512eec384f39f64d03b59df4d8626ca125c199a97093fe243b26f28d35addc79
glibc-common-2.5-49.el5_5.2.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 271597608fc45862307e04c7a7fb3be3
SHA-256: 7e0d176339f4e07e58e6f40767a4926f0d66c045137e7521244d1e1e45037b2a
glibc-devel-2.5-49.el5_5.2.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 1228c07bf9775a2d11b554c246fadd2f
SHA-256: 8f615221262d533070b220cc6e290ecb95da52db34d1c9e6f904c370dd31c5d1
glibc-headers-2.5-49.el5_5.2.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 732cf8fb24aa9e960660b24677fa4c5e
SHA-256: 406529ac284e4a7d5f34b1b3af0108287d58b57b5df1e0fd7a103fffd1814c0f
glibc-utils-2.5-49.el5_5.2.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 72614018fd7f2e6090192c20739226db
SHA-256: 5340eba7f2cfde6382baff38657d858aa402fb5e9adccf6007a28ce27ee40b9f
nscd-2.5-49.el5_5.2.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: db61ace7cc41c64a8ec95e35bded3d53
SHA-256: 7ac95b5ab1f79827476c2f1d94d4b42fe7cfec102ee5ddcadd6158395aaaf2ab
 
IA-64:
glibc-2.5-49.el5_5.2.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: 317e5bd3d7c9c19420e4dd9f9eab5f2f
SHA-256: 512eec384f39f64d03b59df4d8626ca125c199a97093fe243b26f28d35addc79
glibc-2.5-49.el5_5.2.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: b5d8870003cbdf49965ba66fb0c356a1
SHA-256: 7447a8378c2b42eab89f8c18527bfec371e3d2e9e47ecf9c093e0b8bec7e3358
glibc-common-2.5-49.el5_5.2.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 1de37f2be0725550c851b8d4a32db27c
SHA-256: 664a2ba9a564e1f0ed9fbed2b0f13e722400605b8cb5304111d64d4ecb5692ce
glibc-devel-2.5-49.el5_5.2.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 18095e9e53af363921ffa902618f77a4
SHA-256: 641fb75a7a75ee221cf38998a433ecaf4979c548260c8cf3ea6e9ee80d8bef8a
glibc-headers-2.5-49.el5_5.2.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: b14a3e914ac359c7056c1183ea54fc6f
SHA-256: 1fa1d4e304755717f7c75e5d22b0ff774e5121531683a6b7500a15c1467ef94a
glibc-utils-2.5-49.el5_5.2.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 9727f65489943fd546b7fa51549c7929
SHA-256: 8acb0e1346a3af15251ce3d2ad80d083f5f3e0e377c4dd9e7b2ccd75c8a7cf3a
nscd-2.5-49.el5_5.2.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: c27b7fd82af8c533df94059afa194611
SHA-256: 073c28187cc0f03d39aaa66d439cb3f5434a54504392e0be0560b0f27fbb451d
 
PPC:
glibc-2.5-49.el5_5.2.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 51b9be4b1abd379fdbb904316384c5e6
SHA-256: 393896869137e33295238f1ae58674115945092556964bae42ea36e33e12a978
glibc-2.5-49.el5_5.2.ppc64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 0dc2058953803b97d7b31cad953e4c6a
SHA-256: 1f269837784511579904ae5877f68717674b5f7d170941a76076fbcb263ca82b
glibc-common-2.5-49.el5_5.2.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 4709f783c6158e6f208c7dfb5e57de91
SHA-256: 16db4e1d3329f23e4b1fc924a40389018eb8b7bb34d3cc0326ef38c7a50ccccb
glibc-devel-2.5-49.el5_5.2.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 18845eea10bbfbaca6161cc9caa8d32c
SHA-256: ee6ac815cbe99e6817df3e7997fc5f55f9c303238c0d02489e49f8562ab90b3c
glibc-devel-2.5-49.el5_5.2.ppc64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 90c42d0f63d3f5f732ed6618e9076a2d
SHA-256: 69fec50307f30e514985cc88125e4bbbc6e74d90ea3627697c838242d9830d52
glibc-headers-2.5-49.el5_5.2.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 4c3476dfdd4df94a6db54fc0f8ca1f4c
SHA-256: 9b2e045656ca65acd16aafefc897f9611431ac19188d1bfa43e900e2d27e327e
glibc-utils-2.5-49.el5_5.2.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 670b7304c066ab0976234d92153becf4
SHA-256: 8a4d950f493ca8b873d39e9407f682cb6b8624b4e46445e14f1130e560239962
nscd-2.5-49.el5_5.2.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 3a305947ea6fab83e58f08fe9f95cd94
SHA-256: fe4ff5aa68d4fa2789169c2ffe971cca49ed503ff1de6828e7203dffccbfce1a
 
s390x:
glibc-2.5-49.el5_5.2.s390.rpm
File outdated by:  RHSA-2013:1411
    MD5: 58091473f257695ab17b38975df468bb
SHA-256: d0a9fbfd315f675ce644f6d83f547660bd29bfdf6c09fca01bb3c52a90970eb3
glibc-2.5-49.el5_5.2.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: c4ccaea300414777bd911f9778d3ed1b
SHA-256: ad85a48bddf1ac470571e2b2413bffdef66f573e432b36d58efc13fda509a565
glibc-common-2.5-49.el5_5.2.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: fc76f2e37c20ac4bd8fd9a3d275a4eb1
SHA-256: 1260e3bd76dc5e17a4355f2bec737b37b0757ea293982e7ef4162da552384dbc
glibc-devel-2.5-49.el5_5.2.s390.rpm
File outdated by:  RHSA-2013:1411
    MD5: 0ed33148520234ef4566ad08946266e0
SHA-256: 02ff6ed88820a2b75eb813c48f62a23516bf28971e17c0c697d5255427b369fc
glibc-devel-2.5-49.el5_5.2.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 96b36f9da68a087ce0cee5f8f4767e9c
SHA-256: 768f8425d1e64170280d0ec3e42df10a55a79aec9131edbd7935bc7d477d17d0
glibc-headers-2.5-49.el5_5.2.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 63f452a5caeeebfbf78e2d8198d7a723
SHA-256: 136f1537997bb9bef43cfd7053e0763c597bda9c851045fe2d1077727ac81215
glibc-utils-2.5-49.el5_5.2.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: e70f975745b0adb0798b510dbde51fdf
SHA-256: 50162c1f429b8cacf8c955bc29e4f38e2784787b3fca00c6269654f80136a2dc
nscd-2.5-49.el5_5.2.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 8af43b5a6a1516ea229ee9dd172fe72b
SHA-256: 9bf83fadb01857cf0063516322fdde53221341796590ffe0acdaf02bfaa7fcb2
 
x86_64:
glibc-2.5-49.el5_5.2.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: 317e5bd3d7c9c19420e4dd9f9eab5f2f
SHA-256: 512eec384f39f64d03b59df4d8626ca125c199a97093fe243b26f28d35addc79
glibc-2.5-49.el5_5.2.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 216b4dcd164db58819bc21bb688bc2ca
SHA-256: 21430a11bc673378a84ba57681232df0d704fdaae012b01ef1065fead58648cf
glibc-common-2.5-49.el5_5.2.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 2c736b84dd2e1cc8566c9a125fe2d779
SHA-256: 1cd0d8fa8975758753dcc1be7b450b147eb93a268dd86ec9561ae90ebc47b693
glibc-devel-2.5-49.el5_5.2.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 1228c07bf9775a2d11b554c246fadd2f
SHA-256: 8f615221262d533070b220cc6e290ecb95da52db34d1c9e6f904c370dd31c5d1
glibc-devel-2.5-49.el5_5.2.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: a3df37817e59906788107cdb02c5ca75
SHA-256: 03b73d1ce49b0536a9b25c9de4a76495154d40ed56140db79947b68dee931e45
glibc-headers-2.5-49.el5_5.2.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 85c5c16664676152f85de4ecd2fd912c
SHA-256: cb27c7dd8037670dcdc0988350faf65f6a15ad12f0908a9560cf7e12113ad176
glibc-utils-2.5-49.el5_5.2.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 47fde26649b8c2dbfbed5487ef295350
SHA-256: de70d1cde17a164b98583fc38e8024ceb27d02367ed9cc4d1e754934f144dba8
nscd-2.5-49.el5_5.2.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 9c37db77d6249947c6b96e9392ffb601
SHA-256: d343bcff55c19765978018657aeab581f23c208a86cc2c1feba050188a2a5218
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
glibc-2.5-49.el5_5.2.src.rpm
File outdated by:  RHSA-2013:1411
    MD5: b2eddbb78d503c25816a3a9888175be6
SHA-256: 705c40bce17628467b01aa270373902fb5359733c4d280d622dc9c89875fcc0c
 
IA-32:
glibc-2.5-49.el5_5.2.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 47cf3f51909efda24e47e3035f38d3c7
SHA-256: bd6ab7205bf24af5f986055e80ef4344b0dc410d08fcabdcecf8748a46fee0ae
glibc-2.5-49.el5_5.2.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: 317e5bd3d7c9c19420e4dd9f9eab5f2f
SHA-256: 512eec384f39f64d03b59df4d8626ca125c199a97093fe243b26f28d35addc79
glibc-common-2.5-49.el5_5.2.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 271597608fc45862307e04c7a7fb3be3
SHA-256: 7e0d176339f4e07e58e6f40767a4926f0d66c045137e7521244d1e1e45037b2a
glibc-devel-2.5-49.el5_5.2.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 1228c07bf9775a2d11b554c246fadd2f
SHA-256: 8f615221262d533070b220cc6e290ecb95da52db34d1c9e6f904c370dd31c5d1
glibc-headers-2.5-49.el5_5.2.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 732cf8fb24aa9e960660b24677fa4c5e
SHA-256: 406529ac284e4a7d5f34b1b3af0108287d58b57b5df1e0fd7a103fffd1814c0f
glibc-utils-2.5-49.el5_5.2.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 72614018fd7f2e6090192c20739226db
SHA-256: 5340eba7f2cfde6382baff38657d858aa402fb5e9adccf6007a28ce27ee40b9f
nscd-2.5-49.el5_5.2.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: db61ace7cc41c64a8ec95e35bded3d53
SHA-256: 7ac95b5ab1f79827476c2f1d94d4b42fe7cfec102ee5ddcadd6158395aaaf2ab
 
x86_64:
glibc-2.5-49.el5_5.2.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: 317e5bd3d7c9c19420e4dd9f9eab5f2f
SHA-256: 512eec384f39f64d03b59df4d8626ca125c199a97093fe243b26f28d35addc79
glibc-2.5-49.el5_5.2.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 216b4dcd164db58819bc21bb688bc2ca
SHA-256: 21430a11bc673378a84ba57681232df0d704fdaae012b01ef1065fead58648cf
glibc-common-2.5-49.el5_5.2.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 2c736b84dd2e1cc8566c9a125fe2d779
SHA-256: 1cd0d8fa8975758753dcc1be7b450b147eb93a268dd86ec9561ae90ebc47b693
glibc-devel-2.5-49.el5_5.2.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 1228c07bf9775a2d11b554c246fadd2f
SHA-256: 8f615221262d533070b220cc6e290ecb95da52db34d1c9e6f904c370dd31c5d1
glibc-devel-2.5-49.el5_5.2.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: a3df37817e59906788107cdb02c5ca75
SHA-256: 03b73d1ce49b0536a9b25c9de4a76495154d40ed56140db79947b68dee931e45
glibc-headers-2.5-49.el5_5.2.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 85c5c16664676152f85de4ecd2fd912c
SHA-256: cb27c7dd8037670dcdc0988350faf65f6a15ad12f0908a9560cf7e12113ad176
glibc-utils-2.5-49.el5_5.2.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 47fde26649b8c2dbfbed5487ef295350
SHA-256: de70d1cde17a164b98583fc38e8024ceb27d02367ed9cc4d1e754934f144dba8
nscd-2.5-49.el5_5.2.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 9c37db77d6249947c6b96e9392ffb601
SHA-256: d343bcff55c19765978018657aeab581f23c208a86cc2c1feba050188a2a5218
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

589871 - If pthread_create fails in aio_write, requests linked list is corrupted
594617 - pthread cleanup handler is not invoked during thread cancellation



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/