|
| Current Newswire:
Red Hat Bug Fix Advisory: Update to official glibc 2.2Dec 18, 2000, 22:59 (0 Talkback[s])Date: Mon, 18 Dec 2000 17:39 -0500 Red Hat, Inc. Bug Fix Advisory Synopsis: Update to official glibc 2.2 Advisory ID: RHBA-2000:079-09 Issue date: 2000-10-09 Updated on: 2000-12-18 Product: Red Hat Linux Keywords: glibc JDK xmms gethostbyname fscanf gethostid rexec Cross references: N/A 1. Topic: This errata updates the GNU C library to the latest official release (2.2) while fixing several bugs found in glibc 2.1.92-14 and glibc 2.1.94-3. 2000-11-27: Added packages for Red Hat Linux 7 for Alpha 2. Relevant releases/architectures: Red Hat Linux 7.0 - i686, i386, alpha, alphaev6 3. Problem description: Users are strongly urged to update to the latest official GNU C library. This library provides binary compatibility with programs and shared libraries built for older releases of glibc, such as glibc 2.0.x and 2.1.x. Binaries and shared libraries built against glibc-2.1.92-14 or glibc-2.1.94-3 are also binary compatible, but new binaries compiled against this glibc 2.2 might not run on systems with older GNU C library packages installed. This errata fixes several glibc bugs, including JDK programs segfaulting on startup, xmms segfaulting on exit, and how verbose ldconfig was about stale symlinks when it wasn't provided with the -v option (this will now match the behavior of the standalone ldconfig package). This release fixes compatibility bugs with glibc 2.0.x, fixes a C header file problem so that Python 2.0 compiles out of box, and also fixes a bug in locale handling code. Other bugs have also been fixed; see the Bugzilla IDs below and the glibc ChangeLog* files for details. 4. Solution: For each RPM for your particular architecture, run: rpm -Fvh [filename] where filename is the name of the RPM. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6418 - sethostid fails 6. RPMs required: Red Hat Linux 7.0: i686: alpha: i386: alphaev6: sources: 7. Verification: MD5 sum Package Name fb81db9b625ac6d7a077022477ced509 7.0/SRPMS/glibc-2.2-9.src.rpm 2b76e0c03fbc360717e8fa2b927e6765 7.0/alpha/glibc-2.2-9.alpha.rpm a7dd2911fdbd03f7c294b0b9cd384f5b 7.0/alpha/glibc-devel-2.2-9.alpha.rpm 446e236e16736bb5bd8517bab37ded9f 7.0/alpha/glibc-profile-2.2-9.alpha.rpm 5efcb6b2c92f476a6ce6acf799b55092 7.0/alpha/nscd-2.2-9.alpha.rpm ce1d8f89e5ab4541812d422977690bce 7.0/alphaev6/glibc-2.2-9.alphaev6.rpm 352965bb52d07259152f274372b9156a 7.0/i386/glibc-2.2-9.i386.rpm 486f64ad47cae0d1d97ec4eb47e71f6b 7.0/i386/glibc-devel-2.2-9.i386.rpm 4f09e29d9cf810fb8ea05e13e932dd40 7.0/i386/glibc-profile-2.2-9.i386.rpm e518b26a98ffd44a753f926b70a666ed 7.0/i386/nscd-2.2-9.i386.rpm c78c8c64ee7cdc9dbc7412928029ebcd 7.0/i686/glibc-2.2-9.i686.rpmThese packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/corp/contact.html You can verify each package with the following command: If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command: 8. References: N/A Copyright(c) 2000 Red Hat, Inc. |