Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


Top White Papers

More on LinuxToday


Red Hat Bug Fix Advisory: Update to official glibc 2.2

Nov 21, 2000, 21:28 (3 Talkback[s])

Date: Tue, 21 Nov 2000 16:14 -0500
From: bugzilla@redhat.com
To: redhat-watch-list@redhat.com
Subject: [RHBA-2000:079-07] Update to official glibc 2.2


                   Red Hat, Inc. Bug Fix Advisory

Synopsis:          Update to official glibc 2.2
Advisory ID:       RHBA-2000:079-07
Issue date:        2000-10-09
Updated on:        2000-11-21
Product:           Red Hat Linux
Keywords:          glibc JDK xmms gethostbyname fscanf gethostid rexec
Cross references:  N/A

1. Topic:

This errata updates the GNU C library to the latest official release (2.2) while fixing several bugs found in glibc 2.1.92-14 and glibc 2.1.94-3.

2. Relevant releases/architectures:

Red Hat Linux 7.0 - i686, i386
Red Hat Linux 7.0J - i686, i386

3. Problem description:

Users are strongly urged to update to the latest official GNU C library.

This library provides binary compatibility with programs and shared libraries built for older releases of glibc, such as glibc 2.0.x and 2.1.x. Binaries and shared libraries built against glibc-2.1.92-14 or glibc-2.1.94-3 are also binary compatible, but new binaries compiled against this glibc 2.2 might not run on systems with older GNU C library packages installed.

This errata fixes several glibc bugs, including JDK programs segfaulting on startup, xmms segfaulting on exit, and how verbose ldconfig was about stale symlinks when it wasn't provided with the -v option (this will now match the behavior of the standalone ldconfig package). This release fixes compatibility bugs with glibc 2.0.x, fixes a C header file problem so that Python 2.0 compiles out of box, and also fixes a bug in locale handling code. Other bugs have also been fixed; see the Bugzilla IDs below and the glibc ChangeLog* files for details.

4. Solution:

For each RPM for your particular architecture, run:

rpm -Fvh [filename]

where filename is the name of the RPM.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

6418 - sethostid fails
17019 - gethostbyname call SIGSEGVs
17145 - Mutex locks may be broken.
17267 - glibc 2.1.92 is not binary compatible with glibc 2.0
17723 - crypt.h and unistd.h have conflicting function declarations
17832 - multiple IP addresses in /etc/hosts (for one hostname) cause programs to access /etc/hosts via the usual library functions to segfault
17838 - xmms not closing properly
18049 - Sun's JDK 1.2.2 does not run
18316 - stdio problems with fscanf
18832 - efence complains setlocale() in 2.1.94-3 stomps on memory.
18886 - rexec(3) bug in inet/rexec.c
19088 - mis-defines symbol LONG_BIT
19199 - Postgresql Won't start on Alpha
19375 - hesiod/nss_hesiod/hesiod-grp.c (_nss_hesiod_initgroups_dyn)
19495 - Translated messages sometimes presented with wrong character set
19730 - Problems locking a file opened with FILE_OFFSET_BITS 64
20417 - 2.1.97 breaks wine

6. RPMs required:

Red Hat Linux 7.0:

i686:
ftp://updates.redhat.com/7.0/i686/glibc-2.2-5.i686.rpm

i386:
ftp://updates.redhat.com/7.0/i386/glibc-2.2-5.i386.rpm
ftp://updates.redhat.com/7.0/i386/glibc-devel-2.2-5.i386.rpm
ftp://updates.redhat.com/7.0/i386/glibc-profile-2.2-5.i386.rpm
ftp://updates.redhat.com/7.0/i386/nscd-2.2-5.i386.rpm

sources:
ftp://updates.redhat.com/7.0/SRPMS/glibc-2.2-5.src.rpm

7. Verification:

MD5 sum                           Package Name

250d310d5f09c1ffa927dc53bb86141e 7.0/SRPMS/glibc-2.2-5.src.rpm
10c72dce9779338d60c003aa72fc0579 7.0/i386/glibc-2.2-5.i386.rpm
517506c0cc8552bb810c79db9aa9e3ae 7.0/i386/glibc-devel-2.2-5.i386.rpm
bc584eb2ca4e5c8ee521d3db030799cd 7.0/i386/glibc-profile-2.2-5.i386.rpm
4670aba730cb17f055e1fa7a11366af5 7.0/i386/nscd-2.2-5.i386.rpm
2c4e2f0ea5de0e786cc78c2acc495a43 7.0/i686/glibc-2.2-5.i686.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
rpm --checksig <filename>

If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>

8. References:

N/A

Copyright(c) 2000 Red Hat, Inc.