---

Red Hat Bug Fix Advisory: Glibc bug fixes

Date: Mon, 9 Oct 2000 10:40 -0400
From: bugzilla@redhat.com
To: redhat-watch-list@redhat.com
Subject: [RHBA-2000:079-03] Glibc bug fixes


                   Red Hat, Inc. Bug Fix Advisory

Synopsis:          Glibc bug fixes
Advisory ID:       RHBA-2000:079-03
Issue date:        2000-10-09
Updated on:        2000-10-09
Product:           Red Hat Linux
Keywords:          glibc JDK xmms gethostbyname fscanf gethostid
Cross references:  N/A

1. Topic:

This errata fixes a couple of bugs which have been found in the
GNU C library 2.1.92 packages.

2. Relevant releases/architectures:

Red Hat Linux 7.0 – i686, i386
Red Hat Linux 7.0J – i686, i386

3. Problem description:

JDK programs should no longer segfault on startup, xmms should
no longer segfault on exit, a compatibility bug with glibc 2.0.x
should be fixed in this release as well. ldconfig will be less
verbose about stale symlinks if you don’t give it -v option (to
match behaviour of standalone ldconfig package). A couple of other
bugs have been fixed, see bugzilla IDs mentioned below and glibc
ChangeLog for details).

4. Solution:

For each RPM for your particular architecture, run:

rpm -Fvh [filename]

where filename is the name of the RPM.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla
for more info):

6418 – sethostid fails
17019 – gethostbyname call SIGSEGVs
17145 – Mutex locks may be broken.
17267 – glibc 2.1.92 is not binary compatible with glibc 2.0
17723 – crypt.h and unistd.h have conflicting function
declarations
17832 – multiple IP addresses in /etc/hosts (for one hostname)
cause programs to access /etc/hosts via the usual library functions
to segfault
17838 – xmms not closing properly
18049 – Sun’s JDK 1.2.2 does not run
18316 – stdio problems with fscanf

6. RPMs required:

Red Hat Linux 7.0:

i686:
ftp://updates.redhat.com/7.0/i686/glibc-2.1.94-3.i686.rpm

i386:
ftp://updates.redhat.com/7.0/i386/glibc-2.1.94-3.i386.rpm

ftp://updates.redhat.com/7.0/i386/glibc-devel-2.1.94-3.i386.rpm


ftp://updates.redhat.com/7.0/i386/glibc-profile-2.1.94-3.i386.rpm

ftp://updates.redhat.com/7.0/i386/nscd-2.1.94-3.i386.rpm

sources:
ftp://updates.redhat.com/7.0/SRPMS/glibc-2.1.94-3.src.rpm

7. Verification:

MD5 sum                           Package Name

e7dd99eb67a5a2cb3a64513e7931c389 7.0/SRPMS/glibc-2.1.94-3.src.rpm

5beb519cfae51a0cedc984cabd99c278 7.0/i386/glibc-2.1.94-3.i386.rpm
80aad70d68e247b2858310abc79d4e9b 7.0/i386/glibc-devel-2.1.94-3.i386.rpm
32ac67efd27dc94d7fcad75dc86914d5 7.0/i386/glibc-profile-2.1.94-3.i386.rpm
bd9f775abf06c0fa8eed94930e6f1f2a 7.0/i386/nscd-2.1.94-3.i386.rpm
854d89b282ca1bd63eaaa10f1e41cd83 7.0/i686/glibc-2.1.94-3.i686.rpm

These packages are GPG signed by Red Hat, Inc. for security. Our
key is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
rpm –checksig <filename>

If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command:
rpm –checksig –nogpg <filename>

8. References:

N/A

Copyright(c) 2000 Red Hat, Inc.

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis