Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Troubleshoot a product issue
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Troubleshoot a product issue
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Or troubleshoot an issue.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycles

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem Catalog
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Troubleshoot a product issue
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2012:0125 - Security Advisory
Issued:
2012-02-13
Updated:
2012-02-13

RHSA-2012:0125 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: glibc security and bug fix update

Type/Severity

Security Advisory: Moderate

Topic

Updated glibc packages that fix multiple security issues and one bug are
now available for Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The glibc packages contain the standard C libraries used by multiple
programs on the system. These packages contain the standard C and the
standard math libraries. Without these two libraries, a Linux system cannot
function properly.

An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way the glibc library read timezone files. If a
carefully-crafted timezone file was loaded by an application linked against
glibc, it could cause the application to crash or, potentially, execute
arbitrary code with the privileges of the user running the application.
(CVE-2009-5029)

A flaw was found in the way the ldd utility identified dynamically linked
libraries. If an attacker could trick a user into running ldd on a
malicious binary, it could result in arbitrary code execution with the
privileges of the user running ldd. (CVE-2009-5064)

It was discovered that the glibc addmntent() function, used by various
mount helper utilities, did not sanitize its input properly. A local
attacker could possibly use this flaw to inject malformed lines into the
mtab (mounted file systems table) file via certain setuid mount helpers, if
the attacker were allowed to mount to an arbitrary directory under their
control. (CVE-2010-0296)

An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way the glibc library loaded ELF (Executable and Linking
Format) files. If a carefully-crafted ELF file was loaded by an
application linked against glibc, it could cause the application to crash
or, potentially, execute arbitrary code with the privileges of the user
running the application. (CVE-2010-0830)

It was discovered that the glibc fnmatch() function did not properly
restrict the use of alloca(). If the function was called on sufficiently
large inputs, it could cause an application using fnmatch() to crash or,
possibly, execute arbitrary code with the privileges of the application.
(CVE-2011-1071)

It was found that the glibc addmntent() function, used by various mount
helper utilities, did not handle certain errors correctly when updating the
mtab (mounted file systems table) file. If such utilities had the setuid
bit set, a local attacker could use this flaw to corrupt the mtab file.
(CVE-2011-1089)

It was discovered that the locale command did not produce properly escaped
output as required by the POSIX specification. If an attacker were able to
set the locale environment variables in the environment of a script that
performed shell evaluation on the output of the locale command, and that
script were run with different privileges than the attacker's, it could
execute arbitrary code with the privileges of the script. (CVE-2011-1095)

An integer overflow flaw was found in the glibc fnmatch() function. If an
attacker supplied a long UTF-8 string to an application linked against
glibc, it could cause the application to crash. (CVE-2011-1659)

A denial of service flaw was found in the remote procedure call (RPC)
implementation in glibc. A remote attacker able to open a large number of
connections to an RPC service that is using the RPC implementation from
glibc, could use this flaw to make that service use an excessive amount of
CPU time. (CVE-2011-4609)

Red Hat would like to thank the Ubuntu Security Team for reporting
CVE-2010-0830, and Dan Rosenberg for reporting CVE-2011-1089. The Ubuntu
Security Team acknowledges Dan Rosenberg as the original reporter of
CVE-2010-0830.

This update also fixes the following bug:

  • When using an nscd package that is a different version than the glibc

package, the nscd service could fail to start. This update makes the nscd
package require a specific glibc version to prevent this problem.
(BZ#657009)

Users should upgrade to these updated packages, which resolve these issues.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

  • BZ - 559579 - CVE-2010-0296 glibc: Improper encoding of names with certain special character in utilities for writing to mtab table
  • BZ - 599056 - CVE-2010-0830 glibc: ld.so d_tag signedness error in elf_get_dynamic_info
  • BZ - 625893 - CVE-2011-1095 glibc: insufficient quoting in the locale command output
  • BZ - 657009 - nscd rpm installation doesn't check dependencies
  • BZ - 681054 - CVE-2011-1071 CVE-2011-1659 glibc: fnmatch() alloca()-based memory corruption flaw
  • BZ - 688980 - CVE-2011-1089 glibc: Suid mount helpers fail to anticipate RLIMIT_FSIZE
  • BZ - 692393 - CVE-2009-5064 glibc: ldd unexpected code execution issue
  • BZ - 761245 - CVE-2009-5029 glibc: __tzfile_read integer overflow to buffer overflow
  • BZ - 767299 - CVE-2011-4609 glibc: svc_run() produces high cpu usage when accept() fails with EMFILE error

CVEs

  • CVE-2011-1095
  • CVE-2010-0296
  • CVE-2011-1071
  • CVE-2011-1659
  • CVE-2011-1089
  • CVE-2009-5064
  • CVE-2009-5029
  • CVE-2011-4609
  • CVE-2010-0830

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • Note: More recent versions of these packages may be available. Click a package name for more details.

    Red Hat Enterprise Linux Server 4

    SRPM
    glibc-2.3.4-2.57.src.rpm SHA-256: c946f34d9c1861f53a038cbc64be43b5a17a40b3f7a58717b5066cd49b6850ad
    x86_64
    glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
    glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
    glibc-2.3.4-2.57.x86_64.rpm SHA-256: 7f5604ec1211f1bd05c28daee85d96631ce9c47a2069702539131ebd9c10449f
    glibc-2.3.4-2.57.x86_64.rpm SHA-256: 7f5604ec1211f1bd05c28daee85d96631ce9c47a2069702539131ebd9c10449f
    glibc-common-2.3.4-2.57.x86_64.rpm SHA-256: 77fe1b12488479126a2b5ee5c0d8b8f064b115cf8916d1d1580d26b1e6a1201a
    glibc-common-2.3.4-2.57.x86_64.rpm SHA-256: 77fe1b12488479126a2b5ee5c0d8b8f064b115cf8916d1d1580d26b1e6a1201a
    glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
    glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
    glibc-devel-2.3.4-2.57.x86_64.rpm SHA-256: b66ba8c0df0665ad3af697dcf7add60989e4426cc2d45bde89a58fc69015d244
    glibc-devel-2.3.4-2.57.x86_64.rpm SHA-256: b66ba8c0df0665ad3af697dcf7add60989e4426cc2d45bde89a58fc69015d244
    glibc-headers-2.3.4-2.57.x86_64.rpm SHA-256: 9d0b213eb459487f9f7df948bfe3bdc67838001993af9f3f0c1e3d05c45b9aa5
    glibc-headers-2.3.4-2.57.x86_64.rpm SHA-256: 9d0b213eb459487f9f7df948bfe3bdc67838001993af9f3f0c1e3d05c45b9aa5
    glibc-profile-2.3.4-2.57.x86_64.rpm SHA-256: 6d0dd91098ed385c4ac524307b4ef8ea8ac511da3b1538ed5603fa0a709eba98
    glibc-profile-2.3.4-2.57.x86_64.rpm SHA-256: 6d0dd91098ed385c4ac524307b4ef8ea8ac511da3b1538ed5603fa0a709eba98
    glibc-utils-2.3.4-2.57.x86_64.rpm SHA-256: 98917377d05d5db36e69cb9656dfad77c7f8681dbb25ab0bfef325a28dd74aaf
    glibc-utils-2.3.4-2.57.x86_64.rpm SHA-256: 98917377d05d5db36e69cb9656dfad77c7f8681dbb25ab0bfef325a28dd74aaf
    nptl-devel-2.3.4-2.57.x86_64.rpm SHA-256: 0d17f6ed1ed9dc3a9d57a43d218fc94b830c85d9601ccf21d6efb957e2e5032c
    nptl-devel-2.3.4-2.57.x86_64.rpm SHA-256: 0d17f6ed1ed9dc3a9d57a43d218fc94b830c85d9601ccf21d6efb957e2e5032c
    nscd-2.3.4-2.57.x86_64.rpm SHA-256: 9298e674e277fe9c94d632e5c546104a2406c72126eab39db6b3eefac1d7754e
    nscd-2.3.4-2.57.x86_64.rpm SHA-256: 9298e674e277fe9c94d632e5c546104a2406c72126eab39db6b3eefac1d7754e
    ia64
    glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
    glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
    glibc-2.3.4-2.57.ia64.rpm SHA-256: 9e312afc13c153ac3414c57e4f25d1985a6cbcd4b88d5e4116e3ec1279490270
    glibc-2.3.4-2.57.ia64.rpm SHA-256: 9e312afc13c153ac3414c57e4f25d1985a6cbcd4b88d5e4116e3ec1279490270
    glibc-common-2.3.4-2.57.ia64.rpm SHA-256: 174a6d0e3e5d60dab0a5c28c1ea4c4bc09845a208ecc89ead6bf2fba4fe3d748
    glibc-common-2.3.4-2.57.ia64.rpm SHA-256: 174a6d0e3e5d60dab0a5c28c1ea4c4bc09845a208ecc89ead6bf2fba4fe3d748
    glibc-devel-2.3.4-2.57.ia64.rpm SHA-256: 42853ac5f1fb2176dc8ddbf1061063264cd5c47f7f0d2711c02df75b56a32481
    glibc-devel-2.3.4-2.57.ia64.rpm SHA-256: 42853ac5f1fb2176dc8ddbf1061063264cd5c47f7f0d2711c02df75b56a32481
    glibc-headers-2.3.4-2.57.ia64.rpm SHA-256: abca9ea40f717e241f4ce6a2b8da0e3d30872cd84246c74c11dd3f171c0926f1
    glibc-headers-2.3.4-2.57.ia64.rpm SHA-256: abca9ea40f717e241f4ce6a2b8da0e3d30872cd84246c74c11dd3f171c0926f1
    glibc-profile-2.3.4-2.57.ia64.rpm SHA-256: 7ffcc4dee9d585ead4ccf7da2f4d01f40476bb6b83d2143a026451338bc03808
    glibc-profile-2.3.4-2.57.ia64.rpm SHA-256: 7ffcc4dee9d585ead4ccf7da2f4d01f40476bb6b83d2143a026451338bc03808
    glibc-utils-2.3.4-2.57.ia64.rpm SHA-256: b72ac3917542a8bdbcecc0c280a8d742ba79d67a7f14d9ae3e7273ac89e850a0
    glibc-utils-2.3.4-2.57.ia64.rpm SHA-256: b72ac3917542a8bdbcecc0c280a8d742ba79d67a7f14d9ae3e7273ac89e850a0
    nptl-devel-2.3.4-2.57.ia64.rpm SHA-256: b8324bb58486fdb9bcf208bc452eb8375710ee2961bf70118b72725f20c31210
    nptl-devel-2.3.4-2.57.ia64.rpm SHA-256: b8324bb58486fdb9bcf208bc452eb8375710ee2961bf70118b72725f20c31210
    nscd-2.3.4-2.57.ia64.rpm SHA-256: 9dc29a327737436c48a3db17e20257210f08ebc668216ae31535f97c543a7090
    nscd-2.3.4-2.57.ia64.rpm SHA-256: 9dc29a327737436c48a3db17e20257210f08ebc668216ae31535f97c543a7090
    i386
    glibc-2.3.4-2.57.i386.rpm SHA-256: 796d86f23e40db253e6cda8fce826079219e4cfbff3a6d14a3b086a770fae836
    glibc-2.3.4-2.57.i386.rpm SHA-256: 796d86f23e40db253e6cda8fce826079219e4cfbff3a6d14a3b086a770fae836
    glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
    glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
    glibc-common-2.3.4-2.57.i386.rpm SHA-256: 56076e1fd47a7af2eddb4f2e29ad2ea42cea34d0b77f28cd0f90b0163d6e5d8b
    glibc-common-2.3.4-2.57.i386.rpm SHA-256: 56076e1fd47a7af2eddb4f2e29ad2ea42cea34d0b77f28cd0f90b0163d6e5d8b
    glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
    glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
    glibc-headers-2.3.4-2.57.i386.rpm SHA-256: 07e4ec40a796dc24c0461e46fe2d26bc242083386dcd13be78af1f3c629ed1ec
    glibc-headers-2.3.4-2.57.i386.rpm SHA-256: 07e4ec40a796dc24c0461e46fe2d26bc242083386dcd13be78af1f3c629ed1ec
    glibc-profile-2.3.4-2.57.i386.rpm SHA-256: 95d74122980c62ab6164efaa4e0abc5ea403a0e75c61c4f0a1aa1024016d9550
    glibc-profile-2.3.4-2.57.i386.rpm SHA-256: 95d74122980c62ab6164efaa4e0abc5ea403a0e75c61c4f0a1aa1024016d9550
    glibc-utils-2.3.4-2.57.i386.rpm SHA-256: 8ff4c96ab9740077f5f7b328e0632075eb379d5a7722f56847b908c7150049f5
    glibc-utils-2.3.4-2.57.i386.rpm SHA-256: 8ff4c96ab9740077f5f7b328e0632075eb379d5a7722f56847b908c7150049f5
    nptl-devel-2.3.4-2.57.i386.rpm SHA-256: 6c773a3e1c5d20238e4c57c80a14e31549ecf6c458aed4e557c3ef72a87288b8
    nptl-devel-2.3.4-2.57.i386.rpm SHA-256: 6c773a3e1c5d20238e4c57c80a14e31549ecf6c458aed4e557c3ef72a87288b8
    nptl-devel-2.3.4-2.57.i686.rpm SHA-256: a0f38dfab5dfed7d6a5d4df27d7d57a7f8d5ae763042bcc0bef3662d22c27ba8
    nptl-devel-2.3.4-2.57.i686.rpm SHA-256: a0f38dfab5dfed7d6a5d4df27d7d57a7f8d5ae763042bcc0bef3662d22c27ba8
    nscd-2.3.4-2.57.i386.rpm SHA-256: 2529ea0a2c7fafbf5e181ca998b8f2bce9227e99071829d26d9fd25bd68350f3
    nscd-2.3.4-2.57.i386.rpm SHA-256: 2529ea0a2c7fafbf5e181ca998b8f2bce9227e99071829d26d9fd25bd68350f3

    Red Hat Enterprise Linux Workstation 4

    SRPM
    glibc-2.3.4-2.57.src.rpm SHA-256: c946f34d9c1861f53a038cbc64be43b5a17a40b3f7a58717b5066cd49b6850ad
    x86_64
    glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
    glibc-2.3.4-2.57.x86_64.rpm SHA-256: 7f5604ec1211f1bd05c28daee85d96631ce9c47a2069702539131ebd9c10449f
    glibc-common-2.3.4-2.57.x86_64.rpm SHA-256: 77fe1b12488479126a2b5ee5c0d8b8f064b115cf8916d1d1580d26b1e6a1201a
    glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
    glibc-devel-2.3.4-2.57.x86_64.rpm SHA-256: b66ba8c0df0665ad3af697dcf7add60989e4426cc2d45bde89a58fc69015d244
    glibc-headers-2.3.4-2.57.x86_64.rpm SHA-256: 9d0b213eb459487f9f7df948bfe3bdc67838001993af9f3f0c1e3d05c45b9aa5
    glibc-profile-2.3.4-2.57.x86_64.rpm SHA-256: 6d0dd91098ed385c4ac524307b4ef8ea8ac511da3b1538ed5603fa0a709eba98
    glibc-utils-2.3.4-2.57.x86_64.rpm SHA-256: 98917377d05d5db36e69cb9656dfad77c7f8681dbb25ab0bfef325a28dd74aaf
    nptl-devel-2.3.4-2.57.x86_64.rpm SHA-256: 0d17f6ed1ed9dc3a9d57a43d218fc94b830c85d9601ccf21d6efb957e2e5032c
    nscd-2.3.4-2.57.x86_64.rpm SHA-256: 9298e674e277fe9c94d632e5c546104a2406c72126eab39db6b3eefac1d7754e
    ia64
    glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
    glibc-2.3.4-2.57.ia64.rpm SHA-256: 9e312afc13c153ac3414c57e4f25d1985a6cbcd4b88d5e4116e3ec1279490270
    glibc-common-2.3.4-2.57.ia64.rpm SHA-256: 174a6d0e3e5d60dab0a5c28c1ea4c4bc09845a208ecc89ead6bf2fba4fe3d748
    glibc-devel-2.3.4-2.57.ia64.rpm SHA-256: 42853ac5f1fb2176dc8ddbf1061063264cd5c47f7f0d2711c02df75b56a32481
    glibc-headers-2.3.4-2.57.ia64.rpm SHA-256: abca9ea40f717e241f4ce6a2b8da0e3d30872cd84246c74c11dd3f171c0926f1
    glibc-profile-2.3.4-2.57.ia64.rpm SHA-256: 7ffcc4dee9d585ead4ccf7da2f4d01f40476bb6b83d2143a026451338bc03808
    glibc-utils-2.3.4-2.57.ia64.rpm SHA-256: b72ac3917542a8bdbcecc0c280a8d742ba79d67a7f14d9ae3e7273ac89e850a0
    nptl-devel-2.3.4-2.57.ia64.rpm SHA-256: b8324bb58486fdb9bcf208bc452eb8375710ee2961bf70118b72725f20c31210
    nscd-2.3.4-2.57.ia64.rpm SHA-256: 9dc29a327737436c48a3db17e20257210f08ebc668216ae31535f97c543a7090
    i386
    glibc-2.3.4-2.57.i386.rpm SHA-256: 796d86f23e40db253e6cda8fce826079219e4cfbff3a6d14a3b086a770fae836
    glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
    glibc-common-2.3.4-2.57.i386.rpm SHA-256: 56076e1fd47a7af2eddb4f2e29ad2ea42cea34d0b77f28cd0f90b0163d6e5d8b
    glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
    glibc-headers-2.3.4-2.57.i386.rpm SHA-256: 07e4ec40a796dc24c0461e46fe2d26bc242083386dcd13be78af1f3c629ed1ec
    glibc-profile-2.3.4-2.57.i386.rpm SHA-256: 95d74122980c62ab6164efaa4e0abc5ea403a0e75c61c4f0a1aa1024016d9550
    glibc-utils-2.3.4-2.57.i386.rpm SHA-256: 8ff4c96ab9740077f5f7b328e0632075eb379d5a7722f56847b908c7150049f5
    nptl-devel-2.3.4-2.57.i386.rpm SHA-256: 6c773a3e1c5d20238e4c57c80a14e31549ecf6c458aed4e557c3ef72a87288b8
    nptl-devel-2.3.4-2.57.i686.rpm SHA-256: a0f38dfab5dfed7d6a5d4df27d7d57a7f8d5ae763042bcc0bef3662d22c27ba8
    nscd-2.3.4-2.57.i386.rpm SHA-256: 2529ea0a2c7fafbf5e181ca998b8f2bce9227e99071829d26d9fd25bd68350f3

    Red Hat Enterprise Linux Desktop 4

    SRPM
    glibc-2.3.4-2.57.src.rpm SHA-256: c946f34d9c1861f53a038cbc64be43b5a17a40b3f7a58717b5066cd49b6850ad
    x86_64
    glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
    glibc-2.3.4-2.57.x86_64.rpm SHA-256: 7f5604ec1211f1bd05c28daee85d96631ce9c47a2069702539131ebd9c10449f
    glibc-common-2.3.4-2.57.x86_64.rpm SHA-256: 77fe1b12488479126a2b5ee5c0d8b8f064b115cf8916d1d1580d26b1e6a1201a
    glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
    glibc-devel-2.3.4-2.57.x86_64.rpm SHA-256: b66ba8c0df0665ad3af697dcf7add60989e4426cc2d45bde89a58fc69015d244
    glibc-headers-2.3.4-2.57.x86_64.rpm SHA-256: 9d0b213eb459487f9f7df948bfe3bdc67838001993af9f3f0c1e3d05c45b9aa5
    glibc-profile-2.3.4-2.57.x86_64.rpm SHA-256: 6d0dd91098ed385c4ac524307b4ef8ea8ac511da3b1538ed5603fa0a709eba98
    glibc-utils-2.3.4-2.57.x86_64.rpm SHA-256: 98917377d05d5db36e69cb9656dfad77c7f8681dbb25ab0bfef325a28dd74aaf
    nptl-devel-2.3.4-2.57.x86_64.rpm SHA-256: 0d17f6ed1ed9dc3a9d57a43d218fc94b830c85d9601ccf21d6efb957e2e5032c
    nscd-2.3.4-2.57.x86_64.rpm SHA-256: 9298e674e277fe9c94d632e5c546104a2406c72126eab39db6b3eefac1d7754e
    i386
    glibc-2.3.4-2.57.i386.rpm SHA-256: 796d86f23e40db253e6cda8fce826079219e4cfbff3a6d14a3b086a770fae836
    glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
    glibc-common-2.3.4-2.57.i386.rpm SHA-256: 56076e1fd47a7af2eddb4f2e29ad2ea42cea34d0b77f28cd0f90b0163d6e5d8b
    glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
    glibc-headers-2.3.4-2.57.i386.rpm SHA-256: 07e4ec40a796dc24c0461e46fe2d26bc242083386dcd13be78af1f3c629ed1ec
    glibc-profile-2.3.4-2.57.i386.rpm SHA-256: 95d74122980c62ab6164efaa4e0abc5ea403a0e75c61c4f0a1aa1024016d9550
    glibc-utils-2.3.4-2.57.i386.rpm SHA-256: 8ff4c96ab9740077f5f7b328e0632075eb379d5a7722f56847b908c7150049f5
    nptl-devel-2.3.4-2.57.i386.rpm SHA-256: 6c773a3e1c5d20238e4c57c80a14e31549ecf6c458aed4e557c3ef72a87288b8
    nptl-devel-2.3.4-2.57.i686.rpm SHA-256: a0f38dfab5dfed7d6a5d4df27d7d57a7f8d5ae763042bcc0bef3662d22c27ba8
    nscd-2.3.4-2.57.i386.rpm SHA-256: 2529ea0a2c7fafbf5e181ca998b8f2bce9227e99071829d26d9fd25bd68350f3

    Red Hat Enterprise Linux for IBM z Systems 4

    SRPM
    glibc-2.3.4-2.57.src.rpm SHA-256: c946f34d9c1861f53a038cbc64be43b5a17a40b3f7a58717b5066cd49b6850ad
    s390x
    glibc-2.3.4-2.57.s390.rpm SHA-256: 033e70b121ad52f7f6c7f8e0b5d8a38be350f9c22d88416f72c0160a8ae31acb
    glibc-2.3.4-2.57.s390x.rpm SHA-256: 306b3e5d77e0f61521b68dbbfa5640ad36bae8c7e13d46cdeaff425a54a4ca49
    glibc-common-2.3.4-2.57.s390x.rpm SHA-256: 8426602aeef24e1f91884ea68927746c2f418a09b2943436c102ecdd04367789
    glibc-devel-2.3.4-2.57.s390.rpm SHA-256: 949b7b2dfdf4a12071a8433dabc797bfa228fa39938ef730a770ccc253c03988
    glibc-devel-2.3.4-2.57.s390x.rpm SHA-256: e5046c30305ae814ceed95a3de341f8d1632aef73e3ab07b294def363a8a0018
    glibc-headers-2.3.4-2.57.s390x.rpm SHA-256: 33d81b47a7260434ad7cb89f8e7350afdfc138abebb862b7edfdd51eec7a4aab
    glibc-profile-2.3.4-2.57.s390x.rpm SHA-256: 97e2d628671886dd39c1d56d4a409d085cb79d8e8216afad03fe41a61cf1b51d
    glibc-utils-2.3.4-2.57.s390x.rpm SHA-256: 298d82cedbea95b4acac8a3e3a3fbe2b87b8f0ad8860d1847a5bd5d93bd0157e
    nptl-devel-2.3.4-2.57.s390x.rpm SHA-256: 8abc0e063c002115852e16404f057458559bbb8f08aa55d019c1d5f197d43d2e
    nscd-2.3.4-2.57.s390x.rpm SHA-256: 9ebebf4b161875b394f425c475b4e0687d9e997741031e2a90a46d1e47463031
    s390
    glibc-2.3.4-2.57.s390.rpm SHA-256: 033e70b121ad52f7f6c7f8e0b5d8a38be350f9c22d88416f72c0160a8ae31acb
    glibc-common-2.3.4-2.57.s390.rpm SHA-256: 6d0fd80d996cf1707398063d9d08e59ae3f85e2561ac0c8fb2518133635cda79
    glibc-devel-2.3.4-2.57.s390.rpm SHA-256: 949b7b2dfdf4a12071a8433dabc797bfa228fa39938ef730a770ccc253c03988
    glibc-headers-2.3.4-2.57.s390.rpm SHA-256: d111b64bf1b43930aa3bebc6260c22bca3b1498c1b2d02949a7a829d7ef79bca
    glibc-profile-2.3.4-2.57.s390.rpm SHA-256: 61085bcdbf0db1eb6233db63e065b8663cd3087438897e994a345461cf7bcd39
    glibc-utils-2.3.4-2.57.s390.rpm SHA-256: 44b9205be72d39f91fa50b29183193049ea84960d5fd32cd8331a6f4afb1cfde
    nptl-devel-2.3.4-2.57.s390.rpm SHA-256: 1a3d897554150f805cb39a009ef26ece0dc7d778f2e3791f07451b34eee0a77d
    nscd-2.3.4-2.57.s390.rpm SHA-256: 0c1eae384252c0c9edb2b40994cb70801781bc1ac18d29b2a226fd3699462c7d

    Red Hat Enterprise Linux for Power, big endian 4

    SRPM
    glibc-2.3.4-2.57.src.rpm SHA-256: c946f34d9c1861f53a038cbc64be43b5a17a40b3f7a58717b5066cd49b6850ad
    ppc
    glibc-2.3.4-2.57.ppc.rpm SHA-256: 03916db6ecc538fcb30d7e15171d856a8d1441e529920426337a401fa73261a9
    glibc-2.3.4-2.57.ppc64.rpm SHA-256: 711f0d57080f0862c81c94181554528c21c6f27382d6cfe49c39228ecc86b300
    glibc-common-2.3.4-2.57.ppc.rpm SHA-256: 76ddeeef9574dd9cb4a4a5fb32641efb0939807ec4a5f43a8d3fe273d248bd9e
    glibc-devel-2.3.4-2.57.ppc.rpm SHA-256: b27aaa777f7505b285e353d87fb3a16b769e0f5508d26622fa0f3913f6712375
    glibc-devel-2.3.4-2.57.ppc64.rpm SHA-256: cdbe04f7495aeb0f22526e695fce7ad84b86628735a680fdd2d022fcde191226
    glibc-headers-2.3.4-2.57.ppc.rpm SHA-256: 9859bba3eace8f086deb470aa111def2ebb82eb051e92fedb207ba6857d51872
    glibc-profile-2.3.4-2.57.ppc.rpm SHA-256: 8b83cc0a219d95187f362e480783f97a300ec98db4e00493779df026363ec3c1
    glibc-utils-2.3.4-2.57.ppc.rpm SHA-256: 58364e776242a069979866ebfc05308635c3193a3dd72f62b367483cd378c07c
    nptl-devel-2.3.4-2.57.ppc.rpm SHA-256: b6f08005278e174d22116b6e5e4324328a9f32d902fea0b17134f08c11368024
    nscd-2.3.4-2.57.ppc.rpm SHA-256: a4089afc47bdecacc7dfb43ffd8dffab5b1340c680778d504076c91e281de556

    The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

    Red Hat

    Quick Links

    • Downloads
    • Subscriptions
    • Support Cases
    • Customer Service
    • Product Documentation

    Help

    • Contact Us
    • Customer Portal FAQ
    • Log-in Assistance

    Site Info

    • Trust Red Hat
    • Browser Support Policy
    • Accessibility
    • Awards and Recognition
    • Colophon

    Related Sites

    • redhat.com
    • openshift.com
    • developers.redhat.com
    • connect.redhat.com
    • cloud.redhat.com

    About

    • Red Hat Subscription Value
    • About Red Hat
    • Red Hat Jobs
    Copyright © 2021 Red Hat, Inc.
    • Privacy Statement
    • Customer Portal Terms of Use
    • All Policies and Guidelines
    Red Hat Summit
    Twitter Facebook