[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHBA-2002:116-03] Updated GNU C library packages available



---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Bug Fix Advisory

Synopsis:          Updated GNU C library packages available
Advisory ID:       RHBA-2002:116-03
Issue date:        2002-06-18
Updated on:        2002-06-21
Product:           Red Hat Linux
Keywords:          glibc __moddi3 nice gethostent_r
Cross references:  
Obsoletes:         

---------------------------------------------------------------------

1. Topic:

Updated glibc packages are available which fix various bugs discovered in
the GNU C library that shipped with Red Hat Linux 7.3.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - i386, i686

3. Problem description:

The return value of the nice(2) function was not complying to standards
in certain cases. 

Additionally, the default versions of the get*ent_r functions (like
gethostent_r) were mistakenly not exported from libc.so for application use. 

There was also a bug in the 64bit signed modulo helper routine in libc,
which would usually be overridden in the libgcc.a implementation but could
be called in rare cases.

Some additional problems have been detected with the partially sanitized
kernel headers for userland usage which have also been addressed by this
errata.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

65612 - wrong results from __moddi3
65695 - incorrect implementation of __moddi3 in libc-2.2.5.so
66278 - libs6.so has no symbols
64641 - /usr/include/asm/msr.h gone missing...
65076 - /usr/include/asm/timex.h includes asm/msr.h
63620 - error in kernel headers (or in gcc compiler)

6. RPMs required:

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/glibc-2.2.5-36.src.rpm
ftp://updates.redhat.com/7.3/en/os/SRPMS/glibc-kernheaders-2.4-7.16.src.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/glibc-2.2.5-36.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-common-2.2.5-36.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-devel-2.2.5-36.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-utils-2.2.5-36.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-profile-2.2.5-36.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-debug-2.2.5-36.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-debug-static-2.2.5-36.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/nscd-2.2.5-36.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/glibc-kernheaders-2.4-7.16.i386.rpm

i686:
ftp://updates.redhat.com/7.3/en/os/i686/glibc-2.2.5-36.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/glibc-debug-2.2.5-36.i686.rpm



7. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
38f68312a273693b53da78ddf336ff63 7.3/en/os/SRPMS/glibc-2.2.5-36.src.rpm
058c8b5548a88a4d4d6863582e937eb3 7.3/en/os/SRPMS/glibc-kernheaders-2.4-7.16.src.rpm
9a8c4bfbfbb7757970a51404308cd152 7.3/en/os/i386/glibc-2.2.5-36.i386.rpm
8ba73b8cd0fcce7c80508804d334163b 7.3/en/os/i386/glibc-common-2.2.5-36.i386.rpm
3bef09e15e0998fbb9e6b8c8b48f1984 7.3/en/os/i386/glibc-debug-2.2.5-36.i386.rpm
02fedb7275d60962732208e431861d72 7.3/en/os/i386/glibc-debug-static-2.2.5-36.i386.rpm
0bb6820d55ff9a339cdb6e57931d9777 7.3/en/os/i386/glibc-devel-2.2.5-36.i386.rpm
33b986ce914a98b15ec6d518c53fafab 7.3/en/os/i386/glibc-kernheaders-2.4-7.16.i386.rpm
c7db3b9cef9ffab94f32b6328fea58c0 7.3/en/os/i386/glibc-profile-2.2.5-36.i386.rpm
4ad4435155567938293f29f505c328b6 7.3/en/os/i386/glibc-utils-2.2.5-36.i386.rpm
3a859abd7511b405487f30352813c512 7.3/en/os/i386/nscd-2.2.5-36.i386.rpm
386759b03968036129fedd70a96b7e38 7.3/en/os/i686/glibc-2.2.5-36.i686.rpm
d67a165d49245a2ee54b8e22a7cf602e 7.3/en/os/i686/glibc-debug-2.2.5-36.i686.rpm
 

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

8. References:





Copyright(c) 2000, 2001, 2002 Red Hat, Inc.



_______________________________________________
Redhat-watch-list mailing list
To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list





[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]