Skip to navigation

Bug Fix Advisory glibc bug fix update

Advisory: RHBA-2010:0562-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-07-27
Last updated on: 2010-07-27
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated glibc packages that fix various bugs are now available.

The glibc packages contain the standard C libraries used by multiple programs on
the system. These packages contain the standard C and the standard math
libraries. Without these two libraries, the Linux system cannot function
properly.

This update fixes the following bugs:

* under certain circumstances, unloading a module could leave the remaining
modules' symbol search list in an inconsistent state. Consequent to this
inconsistency, symbol lookups could spuriously fail to find the symbol. This
update corrects this: module unloading no longer produces inconsistent state in
the symbol search list. (BZ#604193)

* previously, there was an error in the POWER6 implementation of the "memcpy"
and "memset" functions. As a result, using Concurrent Versions System (CVS) with
Kerberos authentication on the 32-bit PowerPC architecture may have failed with
a segmentation fault. This error has been fixed, and both "memcpy" and "memset"
functions now work as expected. (BZ#614546)

All users are advised to upgrade to these updated packages, which resolve these
issues.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
glibc-2.5-49.el5_5.4.src.rpm
File outdated by:  RHSA-2013:1411
    MD5: 9e8aa1f8ae3c88b75d611ef45e3edbb5
SHA-256: 00f39a0ecd25658c9da93965e0dc5f41c6390ba84d456f2cbc6398107ef1b7be
 
IA-32:
glibc-2.5-49.el5_5.4.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 714ae86bdf6fdd8cbdf555bd1a2e8792
SHA-256: 0be1610f694e3993e756666db8b3bd3d868eed8ae11ce22632eee91e57b5a20e
glibc-2.5-49.el5_5.4.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: df396884e37354f04402ea5a32aadee5
SHA-256: 20ca2626bfbe871631cfaae446cc346977bf954498f263145d2c149b3ec06f34
glibc-common-2.5-49.el5_5.4.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 98c67aa9b74f0e6f1ae21ac4c2f2e6d6
SHA-256: 93c87f3529b9168bbddf1a1882d24157cb717272b16d3c2ee2a83d899c78dd92
glibc-devel-2.5-49.el5_5.4.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: b4e34a86aef029918cd176ee0c356454
SHA-256: d6237bbdc369e5c88b427cc0a5b7f502993371a92521ff71adf70797b50278df
glibc-headers-2.5-49.el5_5.4.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: c945bddb841b77dca3aab2d371b0061e
SHA-256: b50738b88e512f5fffc82a1dd7f057b00b053cc695e2c7cecf6c5321560820f1
glibc-utils-2.5-49.el5_5.4.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: d4d4fedfa39b315560b11b112a6098d4
SHA-256: 7ff7486813bb7d2c25e63153cde7aa5c4724447ac2307e453c5a8a6084f43f6f
nscd-2.5-49.el5_5.4.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 74907b4de97f33ac1cc765117a80c98b
SHA-256: 8fbbf0f0b86acbc92b6bcdd5331168441e102150cf2313f6da1c6b2a76cf9837
 
IA-64:
glibc-2.5-49.el5_5.4.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: df396884e37354f04402ea5a32aadee5
SHA-256: 20ca2626bfbe871631cfaae446cc346977bf954498f263145d2c149b3ec06f34
glibc-2.5-49.el5_5.4.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: b07dad64e724e8ef9e024318a82a169f
SHA-256: 160790656535ebb6dc5c4aefe27a3a95065913120d08d6ba8517189f00c01459
glibc-common-2.5-49.el5_5.4.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 162eeecd061404dde9176b81ee394b99
SHA-256: c156c50aa0440680f3c8b1060842bd3e63cba517476f636de407b001a3ad6044
glibc-devel-2.5-49.el5_5.4.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 21df5daa85f15f0e1dc910f0bc10bba6
SHA-256: 98228785aecb61936ed182e32051784ef745e85780c674338672014bf3e1d3f4
glibc-headers-2.5-49.el5_5.4.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 47a8fe6d46d3b2a41614ae43e7ed6e61
SHA-256: 53af2c34315187985f79399f8ac55366adb10e740b6f9c29cf9e270a4f794c52
glibc-utils-2.5-49.el5_5.4.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 61e3f1cd001e6a56633ea88578c03527
SHA-256: b298ec4af9fa143d8b7fc928febf688bd49d910b4bebe30f805cc07d23b9fcb6
nscd-2.5-49.el5_5.4.ia64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 10cf7d2929649c72954ea54955bd2876
SHA-256: 6110cd5a49298c2729c113f589baeb366c295dc0213c54fc78278541424c07f7
 
PPC:
glibc-2.5-49.el5_5.4.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 8268b19c37e4d60cdb4f7a93098ebd94
SHA-256: 2bed67d52c6e3fb312111e777b8b8009c27cb2c8ee9d6aba175ccf95e74d89fc
glibc-2.5-49.el5_5.4.ppc64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 1554df95adf0bee2f1cc8615e83fb052
SHA-256: bec678457ef789604cc0245161430b0e0b0d0e4bbe70310ea2296204b79940a9
glibc-common-2.5-49.el5_5.4.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 903e2c5a1bac5d2874c7a5d7f8321077
SHA-256: 728f82a709727cd96bbb95bb07ea0bbf1e93b0f955e85e48de71ad8f56f13cd1
glibc-devel-2.5-49.el5_5.4.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 2458a50b6df2e5b74720e5612f296cdc
SHA-256: abd8f30a9893313188b741bd58e6aca98609574d5242b256cdeb332e136fc3c0
glibc-devel-2.5-49.el5_5.4.ppc64.rpm
File outdated by:  RHSA-2013:1411
    MD5: a8c70838ba4055ec5fbc717132ef029e
SHA-256: 2a2edae86d5196d6d4f9a2488914408db579c74631084828e4419d9430f3cbe8
glibc-headers-2.5-49.el5_5.4.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 6f2cf62abc01eecdf9d9003d0715fe35
SHA-256: 59a2e4679d0f1f7b999650b9840becccb7b3bd6e5b2d00e3f5e66247ff04d974
glibc-utils-2.5-49.el5_5.4.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 2265c332c3e6f0e4273e9222476b0688
SHA-256: 1a4d0dae19192978262300035c34e93b87dd401ae167d2095f698bb1fc0dbb4d
nscd-2.5-49.el5_5.4.ppc.rpm
File outdated by:  RHSA-2013:1411
    MD5: 383b2abe7148cf0c7e9d9f1b8803449b
SHA-256: b479e0b61703854b10bb603ab4eba6dbd1553f079330739eb232989d5d744cd6
 
s390x:
glibc-2.5-49.el5_5.4.s390.rpm
File outdated by:  RHSA-2013:1411
    MD5: eefe7ffc3737d279bd131ce820c4faa9
SHA-256: 1a3764b9e6ce5e6ad2eb70d250e9fc859a8a2e55a0d7ba6ed4885befd9c16dc0
glibc-2.5-49.el5_5.4.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: f1687403b21f947830ef789017442c56
SHA-256: c3a9019986e6c2ba6101875de19ae8923c1fac47b9dd751bc84902bd991ae1c2
glibc-common-2.5-49.el5_5.4.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 5ce4e0d8c4a7508a4a3e69ecdfa59fb3
SHA-256: e7f824ff8def8c4c3cf9e99553422ec50b8f7da4a9c66140329d842eb00c807c
glibc-devel-2.5-49.el5_5.4.s390.rpm
File outdated by:  RHSA-2013:1411
    MD5: 39905289f5b9ba704943dc08b6d70ece
SHA-256: 288a4b5db1f0b37d42e443491d3d2bd9bff7b80c7063d0f4573401c5a2beb475
glibc-devel-2.5-49.el5_5.4.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: a6f1a72657eadc7b5202e88382bcc538
SHA-256: e1f56a2b4bd7c02a7550c690c8523344072d8ef6d36d802149afb9291ae1da67
glibc-headers-2.5-49.el5_5.4.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 04a12ec1a5a41ede890c98e2fa6441ea
SHA-256: b3a2f7a4628f3106d7855a86f47a24383e373b3bc51f5d3e9ef173b8f149830f
glibc-utils-2.5-49.el5_5.4.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: 08534934543863ccda1140155f623eb8
SHA-256: fc3e8530fb5a4fd6699fe6fed959471618ff380edf449e6a949d758e2a505e05
nscd-2.5-49.el5_5.4.s390x.rpm
File outdated by:  RHSA-2013:1411
    MD5: c1e9f6e809c273995188582ce51eed91
SHA-256: f41b321a87b16955fa5e742196fd523300b9650ce6847778554ed548284587f0
 
x86_64:
glibc-2.5-49.el5_5.4.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: df396884e37354f04402ea5a32aadee5
SHA-256: 20ca2626bfbe871631cfaae446cc346977bf954498f263145d2c149b3ec06f34
glibc-2.5-49.el5_5.4.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 4955360223e05784a8c7d18683ea3174
SHA-256: 3d0acacdc3f9e2659d3d8915c35650198911161cad0c6b6c27028582f164208e
glibc-common-2.5-49.el5_5.4.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 75a4e3028a7d2dce5b09c43949b5f8f0
SHA-256: e669e2f4bc7431c02b4129f162b60392155fe188ab8dd02b75853a0ae2c66e3e
glibc-devel-2.5-49.el5_5.4.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: b4e34a86aef029918cd176ee0c356454
SHA-256: d6237bbdc369e5c88b427cc0a5b7f502993371a92521ff71adf70797b50278df
glibc-devel-2.5-49.el5_5.4.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: d4846aaf81489f9764ed1203d7ada531
SHA-256: f429516ded7d1ba8e78c1ba2d96b25e41c3ff4a274d137e5f23901fe973c3846
glibc-headers-2.5-49.el5_5.4.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 6b78a395c4252eff887355a49e402240
SHA-256: 31058932fb75c33224326fa0bde1301b1187ce28a3cb14fd95f694f2521aaab9
glibc-utils-2.5-49.el5_5.4.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 28d39d1008d5a4cdc8ebc85855b6f03a
SHA-256: 241fa3b4df039aaf8c86c18e2b9eabe799dfeae2d07f0baf54e487b50357ba96
nscd-2.5-49.el5_5.4.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: bb4835bfca7bc5c00c911fb130d6d864
SHA-256: 33f2f36ee5b8a7321c7d6aaaf2872a222df08e37277ce785cccbc8bb6a12bb79
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
glibc-2.5-49.el5_5.4.src.rpm
File outdated by:  RHSA-2013:1411
    MD5: 9e8aa1f8ae3c88b75d611ef45e3edbb5
SHA-256: 00f39a0ecd25658c9da93965e0dc5f41c6390ba84d456f2cbc6398107ef1b7be
 
IA-32:
glibc-2.5-49.el5_5.4.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 714ae86bdf6fdd8cbdf555bd1a2e8792
SHA-256: 0be1610f694e3993e756666db8b3bd3d868eed8ae11ce22632eee91e57b5a20e
glibc-2.5-49.el5_5.4.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: df396884e37354f04402ea5a32aadee5
SHA-256: 20ca2626bfbe871631cfaae446cc346977bf954498f263145d2c149b3ec06f34
glibc-common-2.5-49.el5_5.4.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 98c67aa9b74f0e6f1ae21ac4c2f2e6d6
SHA-256: 93c87f3529b9168bbddf1a1882d24157cb717272b16d3c2ee2a83d899c78dd92
glibc-devel-2.5-49.el5_5.4.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: b4e34a86aef029918cd176ee0c356454
SHA-256: d6237bbdc369e5c88b427cc0a5b7f502993371a92521ff71adf70797b50278df
glibc-headers-2.5-49.el5_5.4.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: c945bddb841b77dca3aab2d371b0061e
SHA-256: b50738b88e512f5fffc82a1dd7f057b00b053cc695e2c7cecf6c5321560820f1
glibc-utils-2.5-49.el5_5.4.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: d4d4fedfa39b315560b11b112a6098d4
SHA-256: 7ff7486813bb7d2c25e63153cde7aa5c4724447ac2307e453c5a8a6084f43f6f
nscd-2.5-49.el5_5.4.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: 74907b4de97f33ac1cc765117a80c98b
SHA-256: 8fbbf0f0b86acbc92b6bcdd5331168441e102150cf2313f6da1c6b2a76cf9837
 
x86_64:
glibc-2.5-49.el5_5.4.i686.rpm
File outdated by:  RHSA-2013:1411
    MD5: df396884e37354f04402ea5a32aadee5
SHA-256: 20ca2626bfbe871631cfaae446cc346977bf954498f263145d2c149b3ec06f34
glibc-2.5-49.el5_5.4.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 4955360223e05784a8c7d18683ea3174
SHA-256: 3d0acacdc3f9e2659d3d8915c35650198911161cad0c6b6c27028582f164208e
glibc-common-2.5-49.el5_5.4.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 75a4e3028a7d2dce5b09c43949b5f8f0
SHA-256: e669e2f4bc7431c02b4129f162b60392155fe188ab8dd02b75853a0ae2c66e3e
glibc-devel-2.5-49.el5_5.4.i386.rpm
File outdated by:  RHSA-2013:1411
    MD5: b4e34a86aef029918cd176ee0c356454
SHA-256: d6237bbdc369e5c88b427cc0a5b7f502993371a92521ff71adf70797b50278df
glibc-devel-2.5-49.el5_5.4.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: d4846aaf81489f9764ed1203d7ada531
SHA-256: f429516ded7d1ba8e78c1ba2d96b25e41c3ff4a274d137e5f23901fe973c3846
glibc-headers-2.5-49.el5_5.4.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 6b78a395c4252eff887355a49e402240
SHA-256: 31058932fb75c33224326fa0bde1301b1187ce28a3cb14fd95f694f2521aaab9
glibc-utils-2.5-49.el5_5.4.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: 28d39d1008d5a4cdc8ebc85855b6f03a
SHA-256: 241fa3b4df039aaf8c86c18e2b9eabe799dfeae2d07f0baf54e487b50357ba96
nscd-2.5-49.el5_5.4.x86_64.rpm
File outdated by:  RHSA-2013:1411
    MD5: bb4835bfca7bc5c00c911fb130d6d864
SHA-256: 33f2f36ee5b8a7321c7d6aaaf2872a222df08e37277ce785cccbc8bb6a12bb79
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

604193 - [5.4] Unexpected failure of resolving a locally-defined symbol.
614546 - cvs with kerberos authentification segfaults



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/