dcsimg
Linux Today: Linux News On Internet Time.




More on LinuxToday


Red Hat Bug Fix Advisory: Glibc bug fixes

Oct 09, 2000, 19:44 (0 Talkback[s])

WEBINAR:
On-Demand

Re-Imagining Linux Platforms to Meet the Needs of Cloud Service Providers


Date: Mon, 9 Oct 2000 10:40 -0400
From: bugzilla@redhat.com
To: redhat-watch-list@redhat.com
Subject: [RHBA-2000:079-03] Glibc bug fixes


                   Red Hat, Inc. Bug Fix Advisory

Synopsis:          Glibc bug fixes
Advisory ID:       RHBA-2000:079-03
Issue date:        2000-10-09
Updated on:        2000-10-09
Product:           Red Hat Linux
Keywords:          glibc JDK xmms gethostbyname fscanf gethostid
Cross references:  N/A

1. Topic:

This errata fixes a couple of bugs which have been found in the GNU C library 2.1.92 packages.

2. Relevant releases/architectures:

Red Hat Linux 7.0 - i686, i386
Red Hat Linux 7.0J - i686, i386

3. Problem description:

JDK programs should no longer segfault on startup, xmms should no longer segfault on exit, a compatibility bug with glibc 2.0.x should be fixed in this release as well. ldconfig will be less verbose about stale symlinks if you don't give it -v option (to match behaviour of standalone ldconfig package). A couple of other bugs have been fixed, see bugzilla IDs mentioned below and glibc ChangeLog for details).

4. Solution:

For each RPM for your particular architecture, run:

rpm -Fvh [filename]

where filename is the name of the RPM.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

6418 - sethostid fails
17019 - gethostbyname call SIGSEGVs
17145 - Mutex locks may be broken.
17267 - glibc 2.1.92 is not binary compatible with glibc 2.0
17723 - crypt.h and unistd.h have conflicting function declarations
17832 - multiple IP addresses in /etc/hosts (for one hostname) cause programs to access /etc/hosts via the usual library functions to segfault
17838 - xmms not closing properly
18049 - Sun's JDK 1.2.2 does not run
18316 - stdio problems with fscanf

6. RPMs required:

Red Hat Linux 7.0:

i686:
ftp://updates.redhat.com/7.0/i686/glibc-2.1.94-3.i686.rpm

i386:
ftp://updates.redhat.com/7.0/i386/glibc-2.1.94-3.i386.rpm
ftp://updates.redhat.com/7.0/i386/glibc-devel-2.1.94-3.i386.rpm
ftp://updates.redhat.com/7.0/i386/glibc-profile-2.1.94-3.i386.rpm
ftp://updates.redhat.com/7.0/i386/nscd-2.1.94-3.i386.rpm

sources:
ftp://updates.redhat.com/7.0/SRPMS/glibc-2.1.94-3.src.rpm

7. Verification:

MD5 sum                           Package Name

e7dd99eb67a5a2cb3a64513e7931c389 7.0/SRPMS/glibc-2.1.94-3.src.rpm

5beb519cfae51a0cedc984cabd99c278 7.0/i386/glibc-2.1.94-3.i386.rpm
80aad70d68e247b2858310abc79d4e9b 7.0/i386/glibc-devel-2.1.94-3.i386.rpm
32ac67efd27dc94d7fcad75dc86914d5 7.0/i386/glibc-profile-2.1.94-3.i386.rpm
bd9f775abf06c0fa8eed94930e6f1f2a 7.0/i386/nscd-2.1.94-3.i386.rpm
854d89b282ca1bd63eaaa10f1e41cd83 7.0/i686/glibc-2.1.94-3.i686.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
rpm --checksig <filename>

If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>

8. References:

N/A

Copyright(c) 2000 Red Hat, Inc.