Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2009:0080 - Bug Fix Advisory
Issued:
2009-01-20
Updated:
2009-01-20

RHBA-2009:0080 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

glibc bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated glibc packages that fix several bugs and add enhancements are now
available.

Description

The GNU C Library (glibc) packages contain the standard C libraries used by
applications.

This update fixes the following bugs:

  • on certain architectures, when using large applications with hundreds of

threads, the _mcount() function or socket system calls may have corrupted
the stack pointer or, potentially, caused heap corruption and application
segmentation faults. In this update, the _mcount() function and socket
system calls correctly calculate the stack pointer, resolving this issue.

  • a bug in pthread_condattr_setclock(), which caused problems (and hangs)

for certain applications using POSIX threads, has been resolved.

  • inconv() incorrectly transliterated l with stroke and L with stroke.

These characters are transliterated correctly in this update.

  • a bug in "sprof", which caused problems for dlopen(), resulting in

errors such as "sprof: failed to load shared object", has been resolved.

  • when attempting to allocate memory, the valloc() and pvalloc() functions

sometimes failed and returned the ENOMEM signal, even when sufficient
memory was available in arenas other than main, or vice versa. In this
update, valloc() and pvalloc() also try to allocate memory from other
arenas, resolving this issue.

  • the info pages incorrectly stated that setenv() and putenv() were thread

safe. Using these in multi-threaded programs may have caused segmentation
faults. The info pages have been updated to reflect that setenv() and
putenv() are not thread safe.

  • a problem in qsort(), which caused poor application performance on 64-bit

systems in comparison to 32-bit systems, has been resolved.

  • performance issues in malloc() have been resolved. This may have caused

slow-running applications.

  • a race condition, which may have led to segmentation violations on

certain systems, has been resolved.

  • a bug in yp_order(), which caused it to always return order 0, has been

resolved.

  • certain configurations in "/etc/nscd.conf" resulted in commands, such as

"ping", returning a "Floating point exception (core dumped)" error. Also,
"trap divide" errors were logged to "/var/log/messages". This update adds
more robust handling for "/etc/nscd.conf", which resolves this issue.

  • when 12 or more shared libraries all used Thread Local Storage (TLS),

dynamic thread local storage either misbehaved or crashed. This caused
applications using TLS to function incorrectly. In this update, large
numbers of shared libraries are all able to use TLS, resolving this issue.

Also, this update adds the following enhancements:

  • private futexes are now available, increasing performance for certain

applications.

  • maths optimizations for the IBM POWER4 and POWER6.
  • an optimized memset() routine for AMD64 and Intel 64 systems has been

added.

Users of glibc are advised to upgrade to these updated packages, which
resolve these issues and add these enhancements.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 435182 - [RHEL5] poor 64 bit Intel performance on sorting program
  • BZ - 435519 - [RHEL5] yp_order always returns order 0
  • BZ - 438456 - [RHEL5] certain nscd configuration causes trap divide errors
  • BZ - 443827 - iconv incorrectly transliterates the polish characters "?" and "?"
  • BZ - 458861 - [RHEL5] sprof is unable to dlopen shared libraries
  • BZ - 460154 - Performance issue with malloc on RHEL5
  • BZ - 461481 - [5.2] valloc() fails with ENOMEM without trying to use arenas
  • BZ - 478716 - Static /etc/hosts entries ignored after update to 5.3

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
glibc-2.5-34.src.rpm SHA-256: 9061299f2af085d9369a4ed7f456472abe4ed1c3e49ad1eab54db549abd51804
x86_64
glibc-2.5-34.i686.rpm SHA-256: c97313c980d11d4f2dae407649f9919034e035b96853cd7174cc3c5fbd4a4185
glibc-2.5-34.x86_64.rpm SHA-256: 95fd0f3ad3d515601f61b1ef6d3549abbbe967769757458730cd98dcd14dcace
glibc-common-2.5-34.x86_64.rpm SHA-256: b7b9960f949b9adf83dc432ca12642bdc9c83ad895f2783c07648bba39329e99
glibc-devel-2.5-34.i386.rpm SHA-256: aa8e8c0e7277ee76e5d904b0233a081395bfb9bc9568c116a7df9c33f73b0c44
glibc-devel-2.5-34.x86_64.rpm SHA-256: 46dd7cbec70cf60049b6aff724090a1efec28d43adb3bc53de7b3b3223221780
glibc-headers-2.5-34.x86_64.rpm SHA-256: e9b64ee493c0ea4ece73b7b7ffdd0d565d79b2b554551c1a1fd49f09c44ce3de
glibc-utils-2.5-34.x86_64.rpm SHA-256: 866a5c0a9b222a096274efcfae9962e0a92edd7ffdd5297d1d4c234d0b30fff1
nscd-2.5-34.x86_64.rpm SHA-256: 8825ed8991463fb17fc18c3dba95710e02cfbdd4ebc5b4add3081430666b1e13
ia64
glibc-2.5-34.i686.rpm SHA-256: c97313c980d11d4f2dae407649f9919034e035b96853cd7174cc3c5fbd4a4185
glibc-2.5-34.ia64.rpm SHA-256: a5f7f65c07b72a21e98d7e6533169c96882fe688759211d55870b9f6facf0ae7
glibc-common-2.5-34.ia64.rpm SHA-256: 778a0f54ac334e83ab48b4b6dc16d0164b10215307c2488b128dd2ce2c291ee9
glibc-devel-2.5-34.ia64.rpm SHA-256: 0bede5dd0fed3bc28cf52f161904c58e80ff9ec78ed47fa06457ca329463d0e0
glibc-headers-2.5-34.ia64.rpm SHA-256: 0b633eee2be30146465dea77c97d45a4dadf66160ec468d25eba164bd822c044
glibc-utils-2.5-34.ia64.rpm SHA-256: 8fbcc012e125f42862557c29038540b5e649e0c5d2a4a0054c765487748ab86d
nscd-2.5-34.ia64.rpm SHA-256: 9db6f35459617f8ee85004271e89cadcd27023c38415856554377a11c9c07354
i386
glibc-2.5-34.i386.rpm SHA-256: 22dd482a2e5f43742d4b6c81b248243f1aab79897e7250a070ee71776c0216de
glibc-2.5-34.i686.rpm SHA-256: c97313c980d11d4f2dae407649f9919034e035b96853cd7174cc3c5fbd4a4185
glibc-common-2.5-34.i386.rpm SHA-256: d1a924b25c0b896d8148bd77e595d939f85213e2d3fccc8da18857a20c2cf796
glibc-devel-2.5-34.i386.rpm SHA-256: aa8e8c0e7277ee76e5d904b0233a081395bfb9bc9568c116a7df9c33f73b0c44
glibc-headers-2.5-34.i386.rpm SHA-256: 85e72be7d92d3f7bdd4ab231fcd3415cc33219d719066a51af55f5898476f6f8
glibc-utils-2.5-34.i386.rpm SHA-256: bfe4f8e640b2050ce6cf14bca2c31a2d6099b31dc03aa51e5749a9142be311d4
nscd-2.5-34.i386.rpm SHA-256: f53d30f6d8f9060405190aeb03a915572b3b1c31994c3b8fc8c34c70847c1ab2

Red Hat Enterprise Linux Workstation 5

SRPM
glibc-2.5-34.src.rpm SHA-256: 9061299f2af085d9369a4ed7f456472abe4ed1c3e49ad1eab54db549abd51804
x86_64
glibc-2.5-34.i686.rpm SHA-256: c97313c980d11d4f2dae407649f9919034e035b96853cd7174cc3c5fbd4a4185
glibc-2.5-34.x86_64.rpm SHA-256: 95fd0f3ad3d515601f61b1ef6d3549abbbe967769757458730cd98dcd14dcace
glibc-common-2.5-34.x86_64.rpm SHA-256: b7b9960f949b9adf83dc432ca12642bdc9c83ad895f2783c07648bba39329e99
glibc-devel-2.5-34.i386.rpm SHA-256: aa8e8c0e7277ee76e5d904b0233a081395bfb9bc9568c116a7df9c33f73b0c44
glibc-devel-2.5-34.x86_64.rpm SHA-256: 46dd7cbec70cf60049b6aff724090a1efec28d43adb3bc53de7b3b3223221780
glibc-headers-2.5-34.x86_64.rpm SHA-256: e9b64ee493c0ea4ece73b7b7ffdd0d565d79b2b554551c1a1fd49f09c44ce3de
glibc-utils-2.5-34.x86_64.rpm SHA-256: 866a5c0a9b222a096274efcfae9962e0a92edd7ffdd5297d1d4c234d0b30fff1
nscd-2.5-34.x86_64.rpm SHA-256: 8825ed8991463fb17fc18c3dba95710e02cfbdd4ebc5b4add3081430666b1e13
i386
glibc-2.5-34.i386.rpm SHA-256: 22dd482a2e5f43742d4b6c81b248243f1aab79897e7250a070ee71776c0216de
glibc-2.5-34.i686.rpm SHA-256: c97313c980d11d4f2dae407649f9919034e035b96853cd7174cc3c5fbd4a4185
glibc-common-2.5-34.i386.rpm SHA-256: d1a924b25c0b896d8148bd77e595d939f85213e2d3fccc8da18857a20c2cf796
glibc-devel-2.5-34.i386.rpm SHA-256: aa8e8c0e7277ee76e5d904b0233a081395bfb9bc9568c116a7df9c33f73b0c44
glibc-headers-2.5-34.i386.rpm SHA-256: 85e72be7d92d3f7bdd4ab231fcd3415cc33219d719066a51af55f5898476f6f8
glibc-utils-2.5-34.i386.rpm SHA-256: bfe4f8e640b2050ce6cf14bca2c31a2d6099b31dc03aa51e5749a9142be311d4
nscd-2.5-34.i386.rpm SHA-256: f53d30f6d8f9060405190aeb03a915572b3b1c31994c3b8fc8c34c70847c1ab2

Red Hat Enterprise Linux Desktop 5

SRPM
glibc-2.5-34.src.rpm SHA-256: 9061299f2af085d9369a4ed7f456472abe4ed1c3e49ad1eab54db549abd51804
x86_64
glibc-2.5-34.i686.rpm SHA-256: c97313c980d11d4f2dae407649f9919034e035b96853cd7174cc3c5fbd4a4185
glibc-2.5-34.x86_64.rpm SHA-256: 95fd0f3ad3d515601f61b1ef6d3549abbbe967769757458730cd98dcd14dcace
glibc-common-2.5-34.x86_64.rpm SHA-256: b7b9960f949b9adf83dc432ca12642bdc9c83ad895f2783c07648bba39329e99
glibc-devel-2.5-34.i386.rpm SHA-256: aa8e8c0e7277ee76e5d904b0233a081395bfb9bc9568c116a7df9c33f73b0c44
glibc-devel-2.5-34.x86_64.rpm SHA-256: 46dd7cbec70cf60049b6aff724090a1efec28d43adb3bc53de7b3b3223221780
glibc-headers-2.5-34.x86_64.rpm SHA-256: e9b64ee493c0ea4ece73b7b7ffdd0d565d79b2b554551c1a1fd49f09c44ce3de
glibc-utils-2.5-34.x86_64.rpm SHA-256: 866a5c0a9b222a096274efcfae9962e0a92edd7ffdd5297d1d4c234d0b30fff1
nscd-2.5-34.x86_64.rpm SHA-256: 8825ed8991463fb17fc18c3dba95710e02cfbdd4ebc5b4add3081430666b1e13
i386
glibc-2.5-34.i386.rpm SHA-256: 22dd482a2e5f43742d4b6c81b248243f1aab79897e7250a070ee71776c0216de
glibc-2.5-34.i686.rpm SHA-256: c97313c980d11d4f2dae407649f9919034e035b96853cd7174cc3c5fbd4a4185
glibc-common-2.5-34.i386.rpm SHA-256: d1a924b25c0b896d8148bd77e595d939f85213e2d3fccc8da18857a20c2cf796
glibc-devel-2.5-34.i386.rpm SHA-256: aa8e8c0e7277ee76e5d904b0233a081395bfb9bc9568c116a7df9c33f73b0c44
glibc-headers-2.5-34.i386.rpm SHA-256: 85e72be7d92d3f7bdd4ab231fcd3415cc33219d719066a51af55f5898476f6f8
glibc-utils-2.5-34.i386.rpm SHA-256: bfe4f8e640b2050ce6cf14bca2c31a2d6099b31dc03aa51e5749a9142be311d4
nscd-2.5-34.i386.rpm SHA-256: f53d30f6d8f9060405190aeb03a915572b3b1c31994c3b8fc8c34c70847c1ab2

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
glibc-2.5-34.src.rpm SHA-256: 9061299f2af085d9369a4ed7f456472abe4ed1c3e49ad1eab54db549abd51804
s390x
glibc-2.5-34.s390.rpm SHA-256: 622889e846c4fb437a363b04e06498958500ee881c5ff6b475a2132c980552e7
glibc-2.5-34.s390x.rpm SHA-256: 723937f01315ab507591581be86fd3ba61df79261ee104e850d0af90ab9e3796
glibc-common-2.5-34.s390x.rpm SHA-256: fe15b5d88003b34cd938d4d1413ffd4ae3e4c0c60ea6acdd89e838a1aa26021d
glibc-devel-2.5-34.s390.rpm SHA-256: 930cebb781d16bef4aafd21f1c370fa6a42ca8c20c3ec1fbdf0c36a49c5a5033
glibc-devel-2.5-34.s390x.rpm SHA-256: 0b32d9de10792a6f745bf7915d3c907cd82217480a75d3eab6ab9be225b6daad
glibc-headers-2.5-34.s390x.rpm SHA-256: 6e4ca55e4e1c2d0139803c9098738ad2d616b209d99f7df542a4ed2772e568f0
glibc-utils-2.5-34.s390x.rpm SHA-256: 9453fb123045429e3d61a9b3e9c2aa8dfb5a93815ae25275f491aca3b227c4f1
nscd-2.5-34.s390x.rpm SHA-256: 56f46d407ac871ad7b243a477c557537bd3ac4182159c881f9d89444e9b08e69

Red Hat Enterprise Linux for Power, big endian 5

SRPM
glibc-2.5-34.src.rpm SHA-256: 9061299f2af085d9369a4ed7f456472abe4ed1c3e49ad1eab54db549abd51804
ppc
glibc-2.5-34.ppc.rpm SHA-256: 4a4954f37bbe5c7d1705ab5dfb97c339bc70e8038f52fe8e29fbe9eb0bcd9002
glibc-2.5-34.ppc64.rpm SHA-256: a98358005305b098d13c0a98a5ab7eb6a6e8c080ec380f7ec43d98c39c561d5c
glibc-common-2.5-34.ppc.rpm SHA-256: 5139caf849e3cbb64b9abe5d4b29b35ff7cc6d0e3bf5db00acaf5de05ccaaa8a
glibc-devel-2.5-34.ppc.rpm SHA-256: 7d75834fc08f21890c0bd66239dc271ec9e41e540ad621c9d2cf4a2b6264fad1
glibc-devel-2.5-34.ppc64.rpm SHA-256: f81cae56abd9b835d4d421042e5f42526d7016c9122c008e1db276677b879f67
glibc-headers-2.5-34.ppc.rpm SHA-256: 7e0d8dffa407416dc8b73c3b2d3527a6c08333dcaedac941ffb8689b5bfeb94f
glibc-utils-2.5-34.ppc.rpm SHA-256: 3c712851f31fb9ad1086dbf154a5a92b6a72f9187be913c1d511c2075e088678
nscd-2.5-34.ppc.rpm SHA-256: 41020de122fecc3d041fa9ef529a76e24b76f3d4a58cc7d0b3d70aecd776b9b1

Red Hat Enterprise Linux Server from RHUI 5

SRPM
glibc-2.5-34.src.rpm SHA-256: 9061299f2af085d9369a4ed7f456472abe4ed1c3e49ad1eab54db549abd51804
x86_64
glibc-2.5-34.i686.rpm SHA-256: c97313c980d11d4f2dae407649f9919034e035b96853cd7174cc3c5fbd4a4185
glibc-2.5-34.x86_64.rpm SHA-256: 95fd0f3ad3d515601f61b1ef6d3549abbbe967769757458730cd98dcd14dcace
glibc-common-2.5-34.x86_64.rpm SHA-256: b7b9960f949b9adf83dc432ca12642bdc9c83ad895f2783c07648bba39329e99
glibc-devel-2.5-34.i386.rpm SHA-256: aa8e8c0e7277ee76e5d904b0233a081395bfb9bc9568c116a7df9c33f73b0c44
glibc-devel-2.5-34.x86_64.rpm SHA-256: 46dd7cbec70cf60049b6aff724090a1efec28d43adb3bc53de7b3b3223221780
glibc-headers-2.5-34.x86_64.rpm SHA-256: e9b64ee493c0ea4ece73b7b7ffdd0d565d79b2b554551c1a1fd49f09c44ce3de
glibc-utils-2.5-34.x86_64.rpm SHA-256: 866a5c0a9b222a096274efcfae9962e0a92edd7ffdd5297d1d4c234d0b30fff1
nscd-2.5-34.x86_64.rpm SHA-256: 8825ed8991463fb17fc18c3dba95710e02cfbdd4ebc5b4add3081430666b1e13
i386
glibc-2.5-34.i386.rpm SHA-256: 22dd482a2e5f43742d4b6c81b248243f1aab79897e7250a070ee71776c0216de
glibc-2.5-34.i686.rpm SHA-256: c97313c980d11d4f2dae407649f9919034e035b96853cd7174cc3c5fbd4a4185
glibc-common-2.5-34.i386.rpm SHA-256: d1a924b25c0b896d8148bd77e595d939f85213e2d3fccc8da18857a20c2cf796
glibc-devel-2.5-34.i386.rpm SHA-256: aa8e8c0e7277ee76e5d904b0233a081395bfb9bc9568c116a7df9c33f73b0c44
glibc-headers-2.5-34.i386.rpm SHA-256: 85e72be7d92d3f7bdd4ab231fcd3415cc33219d719066a51af55f5898476f6f8
glibc-utils-2.5-34.i386.rpm SHA-256: bfe4f8e640b2050ce6cf14bca2c31a2d6099b31dc03aa51e5749a9142be311d4
nscd-2.5-34.i386.rpm SHA-256: f53d30f6d8f9060405190aeb03a915572b3b1c31994c3b8fc8c34c70847c1ab2

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility