Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:0125 - Security Advisory
Issued:
2012-02-13
Updated:
2012-02-13

RHSA-2012:0125 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: glibc security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated glibc packages that fix multiple security issues and one bug are
now available for Red Hat Enterprise Linux 4.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The glibc packages contain the standard C libraries used by multiple
programs on the system. These packages contain the standard C and the
standard math libraries. Without these two libraries, a Linux system cannot
function properly.

An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way the glibc library read timezone files. If a
carefully-crafted timezone file was loaded by an application linked against
glibc, it could cause the application to crash or, potentially, execute
arbitrary code with the privileges of the user running the application.
(CVE-2009-5029)

A flaw was found in the way the ldd utility identified dynamically linked
libraries. If an attacker could trick a user into running ldd on a
malicious binary, it could result in arbitrary code execution with the
privileges of the user running ldd. (CVE-2009-5064)

It was discovered that the glibc addmntent() function, used by various
mount helper utilities, did not sanitize its input properly. A local
attacker could possibly use this flaw to inject malformed lines into the
mtab (mounted file systems table) file via certain setuid mount helpers, if
the attacker were allowed to mount to an arbitrary directory under their
control. (CVE-2010-0296)

An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way the glibc library loaded ELF (Executable and Linking
Format) files. If a carefully-crafted ELF file was loaded by an
application linked against glibc, it could cause the application to crash
or, potentially, execute arbitrary code with the privileges of the user
running the application. (CVE-2010-0830)

It was discovered that the glibc fnmatch() function did not properly
restrict the use of alloca(). If the function was called on sufficiently
large inputs, it could cause an application using fnmatch() to crash or,
possibly, execute arbitrary code with the privileges of the application.
(CVE-2011-1071)

It was found that the glibc addmntent() function, used by various mount
helper utilities, did not handle certain errors correctly when updating the
mtab (mounted file systems table) file. If such utilities had the setuid
bit set, a local attacker could use this flaw to corrupt the mtab file.
(CVE-2011-1089)

It was discovered that the locale command did not produce properly escaped
output as required by the POSIX specification. If an attacker were able to
set the locale environment variables in the environment of a script that
performed shell evaluation on the output of the locale command, and that
script were run with different privileges than the attacker's, it could
execute arbitrary code with the privileges of the script. (CVE-2011-1095)

An integer overflow flaw was found in the glibc fnmatch() function. If an
attacker supplied a long UTF-8 string to an application linked against
glibc, it could cause the application to crash. (CVE-2011-1659)

A denial of service flaw was found in the remote procedure call (RPC)
implementation in glibc. A remote attacker able to open a large number of
connections to an RPC service that is using the RPC implementation from
glibc, could use this flaw to make that service use an excessive amount of
CPU time. (CVE-2011-4609)

Red Hat would like to thank the Ubuntu Security Team for reporting
CVE-2010-0830, and Dan Rosenberg for reporting CVE-2011-1089. The Ubuntu
Security Team acknowledges Dan Rosenberg as the original reporter of
CVE-2010-0830.

This update also fixes the following bug:

  • When using an nscd package that is a different version than the glibc

package, the nscd service could fail to start. This update makes the nscd
package require a specific glibc version to prevent this problem.
(BZ#657009)

Users should upgrade to these updated packages, which resolve these issues.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

  • BZ - 559579 - CVE-2010-0296 glibc: Improper encoding of names with certain special character in utilities for writing to mtab table
  • BZ - 599056 - CVE-2010-0830 glibc: ld.so d_tag signedness error in elf_get_dynamic_info
  • BZ - 625893 - CVE-2011-1095 glibc: insufficient quoting in the locale command output
  • BZ - 657009 - nscd rpm installation doesn't check dependencies
  • BZ - 681054 - CVE-2011-1071 CVE-2011-1659 glibc: fnmatch() alloca()-based memory corruption flaw
  • BZ - 688980 - CVE-2011-1089 glibc: Suid mount helpers fail to anticipate RLIMIT_FSIZE
  • BZ - 692393 - CVE-2009-5064 glibc: ldd unexpected code execution issue
  • BZ - 761245 - CVE-2009-5029 glibc: __tzfile_read integer overflow to buffer overflow
  • BZ - 767299 - CVE-2011-4609 glibc: svc_run() produces high cpu usage when accept() fails with EMFILE error

CVEs

  • CVE-2011-1095
  • CVE-2010-0296
  • CVE-2011-1071
  • CVE-2011-1659
  • CVE-2011-1089
  • CVE-2009-5064
  • CVE-2009-5029
  • CVE-2011-4609
  • CVE-2010-0830

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
glibc-2.3.4-2.57.src.rpm SHA-256: c946f34d9c1861f53a038cbc64be43b5a17a40b3f7a58717b5066cd49b6850ad
x86_64
glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
glibc-2.3.4-2.57.x86_64.rpm SHA-256: 7f5604ec1211f1bd05c28daee85d96631ce9c47a2069702539131ebd9c10449f
glibc-2.3.4-2.57.x86_64.rpm SHA-256: 7f5604ec1211f1bd05c28daee85d96631ce9c47a2069702539131ebd9c10449f
glibc-common-2.3.4-2.57.x86_64.rpm SHA-256: 77fe1b12488479126a2b5ee5c0d8b8f064b115cf8916d1d1580d26b1e6a1201a
glibc-common-2.3.4-2.57.x86_64.rpm SHA-256: 77fe1b12488479126a2b5ee5c0d8b8f064b115cf8916d1d1580d26b1e6a1201a
glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
glibc-devel-2.3.4-2.57.x86_64.rpm SHA-256: b66ba8c0df0665ad3af697dcf7add60989e4426cc2d45bde89a58fc69015d244
glibc-devel-2.3.4-2.57.x86_64.rpm SHA-256: b66ba8c0df0665ad3af697dcf7add60989e4426cc2d45bde89a58fc69015d244
glibc-headers-2.3.4-2.57.x86_64.rpm SHA-256: 9d0b213eb459487f9f7df948bfe3bdc67838001993af9f3f0c1e3d05c45b9aa5
glibc-headers-2.3.4-2.57.x86_64.rpm SHA-256: 9d0b213eb459487f9f7df948bfe3bdc67838001993af9f3f0c1e3d05c45b9aa5
glibc-profile-2.3.4-2.57.x86_64.rpm SHA-256: 6d0dd91098ed385c4ac524307b4ef8ea8ac511da3b1538ed5603fa0a709eba98
glibc-profile-2.3.4-2.57.x86_64.rpm SHA-256: 6d0dd91098ed385c4ac524307b4ef8ea8ac511da3b1538ed5603fa0a709eba98
glibc-utils-2.3.4-2.57.x86_64.rpm SHA-256: 98917377d05d5db36e69cb9656dfad77c7f8681dbb25ab0bfef325a28dd74aaf
glibc-utils-2.3.4-2.57.x86_64.rpm SHA-256: 98917377d05d5db36e69cb9656dfad77c7f8681dbb25ab0bfef325a28dd74aaf
nptl-devel-2.3.4-2.57.x86_64.rpm SHA-256: 0d17f6ed1ed9dc3a9d57a43d218fc94b830c85d9601ccf21d6efb957e2e5032c
nptl-devel-2.3.4-2.57.x86_64.rpm SHA-256: 0d17f6ed1ed9dc3a9d57a43d218fc94b830c85d9601ccf21d6efb957e2e5032c
nscd-2.3.4-2.57.x86_64.rpm SHA-256: 9298e674e277fe9c94d632e5c546104a2406c72126eab39db6b3eefac1d7754e
nscd-2.3.4-2.57.x86_64.rpm SHA-256: 9298e674e277fe9c94d632e5c546104a2406c72126eab39db6b3eefac1d7754e
ia64
glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
glibc-2.3.4-2.57.ia64.rpm SHA-256: 9e312afc13c153ac3414c57e4f25d1985a6cbcd4b88d5e4116e3ec1279490270
glibc-2.3.4-2.57.ia64.rpm SHA-256: 9e312afc13c153ac3414c57e4f25d1985a6cbcd4b88d5e4116e3ec1279490270
glibc-common-2.3.4-2.57.ia64.rpm SHA-256: 174a6d0e3e5d60dab0a5c28c1ea4c4bc09845a208ecc89ead6bf2fba4fe3d748
glibc-common-2.3.4-2.57.ia64.rpm SHA-256: 174a6d0e3e5d60dab0a5c28c1ea4c4bc09845a208ecc89ead6bf2fba4fe3d748
glibc-devel-2.3.4-2.57.ia64.rpm SHA-256: 42853ac5f1fb2176dc8ddbf1061063264cd5c47f7f0d2711c02df75b56a32481
glibc-devel-2.3.4-2.57.ia64.rpm SHA-256: 42853ac5f1fb2176dc8ddbf1061063264cd5c47f7f0d2711c02df75b56a32481
glibc-headers-2.3.4-2.57.ia64.rpm SHA-256: abca9ea40f717e241f4ce6a2b8da0e3d30872cd84246c74c11dd3f171c0926f1
glibc-headers-2.3.4-2.57.ia64.rpm SHA-256: abca9ea40f717e241f4ce6a2b8da0e3d30872cd84246c74c11dd3f171c0926f1
glibc-profile-2.3.4-2.57.ia64.rpm SHA-256: 7ffcc4dee9d585ead4ccf7da2f4d01f40476bb6b83d2143a026451338bc03808
glibc-profile-2.3.4-2.57.ia64.rpm SHA-256: 7ffcc4dee9d585ead4ccf7da2f4d01f40476bb6b83d2143a026451338bc03808
glibc-utils-2.3.4-2.57.ia64.rpm SHA-256: b72ac3917542a8bdbcecc0c280a8d742ba79d67a7f14d9ae3e7273ac89e850a0
glibc-utils-2.3.4-2.57.ia64.rpm SHA-256: b72ac3917542a8bdbcecc0c280a8d742ba79d67a7f14d9ae3e7273ac89e850a0
nptl-devel-2.3.4-2.57.ia64.rpm SHA-256: b8324bb58486fdb9bcf208bc452eb8375710ee2961bf70118b72725f20c31210
nptl-devel-2.3.4-2.57.ia64.rpm SHA-256: b8324bb58486fdb9bcf208bc452eb8375710ee2961bf70118b72725f20c31210
nscd-2.3.4-2.57.ia64.rpm SHA-256: 9dc29a327737436c48a3db17e20257210f08ebc668216ae31535f97c543a7090
nscd-2.3.4-2.57.ia64.rpm SHA-256: 9dc29a327737436c48a3db17e20257210f08ebc668216ae31535f97c543a7090
i386
glibc-2.3.4-2.57.i386.rpm SHA-256: 796d86f23e40db253e6cda8fce826079219e4cfbff3a6d14a3b086a770fae836
glibc-2.3.4-2.57.i386.rpm SHA-256: 796d86f23e40db253e6cda8fce826079219e4cfbff3a6d14a3b086a770fae836
glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
glibc-common-2.3.4-2.57.i386.rpm SHA-256: 56076e1fd47a7af2eddb4f2e29ad2ea42cea34d0b77f28cd0f90b0163d6e5d8b
glibc-common-2.3.4-2.57.i386.rpm SHA-256: 56076e1fd47a7af2eddb4f2e29ad2ea42cea34d0b77f28cd0f90b0163d6e5d8b
glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
glibc-headers-2.3.4-2.57.i386.rpm SHA-256: 07e4ec40a796dc24c0461e46fe2d26bc242083386dcd13be78af1f3c629ed1ec
glibc-headers-2.3.4-2.57.i386.rpm SHA-256: 07e4ec40a796dc24c0461e46fe2d26bc242083386dcd13be78af1f3c629ed1ec
glibc-profile-2.3.4-2.57.i386.rpm SHA-256: 95d74122980c62ab6164efaa4e0abc5ea403a0e75c61c4f0a1aa1024016d9550
glibc-profile-2.3.4-2.57.i386.rpm SHA-256: 95d74122980c62ab6164efaa4e0abc5ea403a0e75c61c4f0a1aa1024016d9550
glibc-utils-2.3.4-2.57.i386.rpm SHA-256: 8ff4c96ab9740077f5f7b328e0632075eb379d5a7722f56847b908c7150049f5
glibc-utils-2.3.4-2.57.i386.rpm SHA-256: 8ff4c96ab9740077f5f7b328e0632075eb379d5a7722f56847b908c7150049f5
nptl-devel-2.3.4-2.57.i386.rpm SHA-256: 6c773a3e1c5d20238e4c57c80a14e31549ecf6c458aed4e557c3ef72a87288b8
nptl-devel-2.3.4-2.57.i386.rpm SHA-256: 6c773a3e1c5d20238e4c57c80a14e31549ecf6c458aed4e557c3ef72a87288b8
nptl-devel-2.3.4-2.57.i686.rpm SHA-256: a0f38dfab5dfed7d6a5d4df27d7d57a7f8d5ae763042bcc0bef3662d22c27ba8
nptl-devel-2.3.4-2.57.i686.rpm SHA-256: a0f38dfab5dfed7d6a5d4df27d7d57a7f8d5ae763042bcc0bef3662d22c27ba8
nscd-2.3.4-2.57.i386.rpm SHA-256: 2529ea0a2c7fafbf5e181ca998b8f2bce9227e99071829d26d9fd25bd68350f3
nscd-2.3.4-2.57.i386.rpm SHA-256: 2529ea0a2c7fafbf5e181ca998b8f2bce9227e99071829d26d9fd25bd68350f3

Red Hat Enterprise Linux Workstation 4

SRPM
glibc-2.3.4-2.57.src.rpm SHA-256: c946f34d9c1861f53a038cbc64be43b5a17a40b3f7a58717b5066cd49b6850ad
x86_64
glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
glibc-2.3.4-2.57.x86_64.rpm SHA-256: 7f5604ec1211f1bd05c28daee85d96631ce9c47a2069702539131ebd9c10449f
glibc-common-2.3.4-2.57.x86_64.rpm SHA-256: 77fe1b12488479126a2b5ee5c0d8b8f064b115cf8916d1d1580d26b1e6a1201a
glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
glibc-devel-2.3.4-2.57.x86_64.rpm SHA-256: b66ba8c0df0665ad3af697dcf7add60989e4426cc2d45bde89a58fc69015d244
glibc-headers-2.3.4-2.57.x86_64.rpm SHA-256: 9d0b213eb459487f9f7df948bfe3bdc67838001993af9f3f0c1e3d05c45b9aa5
glibc-profile-2.3.4-2.57.x86_64.rpm SHA-256: 6d0dd91098ed385c4ac524307b4ef8ea8ac511da3b1538ed5603fa0a709eba98
glibc-utils-2.3.4-2.57.x86_64.rpm SHA-256: 98917377d05d5db36e69cb9656dfad77c7f8681dbb25ab0bfef325a28dd74aaf
nptl-devel-2.3.4-2.57.x86_64.rpm SHA-256: 0d17f6ed1ed9dc3a9d57a43d218fc94b830c85d9601ccf21d6efb957e2e5032c
nscd-2.3.4-2.57.x86_64.rpm SHA-256: 9298e674e277fe9c94d632e5c546104a2406c72126eab39db6b3eefac1d7754e
ia64
glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
glibc-2.3.4-2.57.ia64.rpm SHA-256: 9e312afc13c153ac3414c57e4f25d1985a6cbcd4b88d5e4116e3ec1279490270
glibc-common-2.3.4-2.57.ia64.rpm SHA-256: 174a6d0e3e5d60dab0a5c28c1ea4c4bc09845a208ecc89ead6bf2fba4fe3d748
glibc-devel-2.3.4-2.57.ia64.rpm SHA-256: 42853ac5f1fb2176dc8ddbf1061063264cd5c47f7f0d2711c02df75b56a32481
glibc-headers-2.3.4-2.57.ia64.rpm SHA-256: abca9ea40f717e241f4ce6a2b8da0e3d30872cd84246c74c11dd3f171c0926f1
glibc-profile-2.3.4-2.57.ia64.rpm SHA-256: 7ffcc4dee9d585ead4ccf7da2f4d01f40476bb6b83d2143a026451338bc03808
glibc-utils-2.3.4-2.57.ia64.rpm SHA-256: b72ac3917542a8bdbcecc0c280a8d742ba79d67a7f14d9ae3e7273ac89e850a0
nptl-devel-2.3.4-2.57.ia64.rpm SHA-256: b8324bb58486fdb9bcf208bc452eb8375710ee2961bf70118b72725f20c31210
nscd-2.3.4-2.57.ia64.rpm SHA-256: 9dc29a327737436c48a3db17e20257210f08ebc668216ae31535f97c543a7090
i386
glibc-2.3.4-2.57.i386.rpm SHA-256: 796d86f23e40db253e6cda8fce826079219e4cfbff3a6d14a3b086a770fae836
glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
glibc-common-2.3.4-2.57.i386.rpm SHA-256: 56076e1fd47a7af2eddb4f2e29ad2ea42cea34d0b77f28cd0f90b0163d6e5d8b
glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
glibc-headers-2.3.4-2.57.i386.rpm SHA-256: 07e4ec40a796dc24c0461e46fe2d26bc242083386dcd13be78af1f3c629ed1ec
glibc-profile-2.3.4-2.57.i386.rpm SHA-256: 95d74122980c62ab6164efaa4e0abc5ea403a0e75c61c4f0a1aa1024016d9550
glibc-utils-2.3.4-2.57.i386.rpm SHA-256: 8ff4c96ab9740077f5f7b328e0632075eb379d5a7722f56847b908c7150049f5
nptl-devel-2.3.4-2.57.i386.rpm SHA-256: 6c773a3e1c5d20238e4c57c80a14e31549ecf6c458aed4e557c3ef72a87288b8
nptl-devel-2.3.4-2.57.i686.rpm SHA-256: a0f38dfab5dfed7d6a5d4df27d7d57a7f8d5ae763042bcc0bef3662d22c27ba8
nscd-2.3.4-2.57.i386.rpm SHA-256: 2529ea0a2c7fafbf5e181ca998b8f2bce9227e99071829d26d9fd25bd68350f3

Red Hat Enterprise Linux Desktop 4

SRPM
glibc-2.3.4-2.57.src.rpm SHA-256: c946f34d9c1861f53a038cbc64be43b5a17a40b3f7a58717b5066cd49b6850ad
x86_64
glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
glibc-2.3.4-2.57.x86_64.rpm SHA-256: 7f5604ec1211f1bd05c28daee85d96631ce9c47a2069702539131ebd9c10449f
glibc-common-2.3.4-2.57.x86_64.rpm SHA-256: 77fe1b12488479126a2b5ee5c0d8b8f064b115cf8916d1d1580d26b1e6a1201a
glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
glibc-devel-2.3.4-2.57.x86_64.rpm SHA-256: b66ba8c0df0665ad3af697dcf7add60989e4426cc2d45bde89a58fc69015d244
glibc-headers-2.3.4-2.57.x86_64.rpm SHA-256: 9d0b213eb459487f9f7df948bfe3bdc67838001993af9f3f0c1e3d05c45b9aa5
glibc-profile-2.3.4-2.57.x86_64.rpm SHA-256: 6d0dd91098ed385c4ac524307b4ef8ea8ac511da3b1538ed5603fa0a709eba98
glibc-utils-2.3.4-2.57.x86_64.rpm SHA-256: 98917377d05d5db36e69cb9656dfad77c7f8681dbb25ab0bfef325a28dd74aaf
nptl-devel-2.3.4-2.57.x86_64.rpm SHA-256: 0d17f6ed1ed9dc3a9d57a43d218fc94b830c85d9601ccf21d6efb957e2e5032c
nscd-2.3.4-2.57.x86_64.rpm SHA-256: 9298e674e277fe9c94d632e5c546104a2406c72126eab39db6b3eefac1d7754e
i386
glibc-2.3.4-2.57.i386.rpm SHA-256: 796d86f23e40db253e6cda8fce826079219e4cfbff3a6d14a3b086a770fae836
glibc-2.3.4-2.57.i686.rpm SHA-256: aaa88e80b2c98885d1247a21808a61a908d5773562683ff699526e64037db532
glibc-common-2.3.4-2.57.i386.rpm SHA-256: 56076e1fd47a7af2eddb4f2e29ad2ea42cea34d0b77f28cd0f90b0163d6e5d8b
glibc-devel-2.3.4-2.57.i386.rpm SHA-256: 8b159ecc0bd002d46e4d3f463cf227ab3090f127b857805278ba2380b5e9f445
glibc-headers-2.3.4-2.57.i386.rpm SHA-256: 07e4ec40a796dc24c0461e46fe2d26bc242083386dcd13be78af1f3c629ed1ec
glibc-profile-2.3.4-2.57.i386.rpm SHA-256: 95d74122980c62ab6164efaa4e0abc5ea403a0e75c61c4f0a1aa1024016d9550
glibc-utils-2.3.4-2.57.i386.rpm SHA-256: 8ff4c96ab9740077f5f7b328e0632075eb379d5a7722f56847b908c7150049f5
nptl-devel-2.3.4-2.57.i386.rpm SHA-256: 6c773a3e1c5d20238e4c57c80a14e31549ecf6c458aed4e557c3ef72a87288b8
nptl-devel-2.3.4-2.57.i686.rpm SHA-256: a0f38dfab5dfed7d6a5d4df27d7d57a7f8d5ae763042bcc0bef3662d22c27ba8
nscd-2.3.4-2.57.i386.rpm SHA-256: 2529ea0a2c7fafbf5e181ca998b8f2bce9227e99071829d26d9fd25bd68350f3

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
glibc-2.3.4-2.57.src.rpm SHA-256: c946f34d9c1861f53a038cbc64be43b5a17a40b3f7a58717b5066cd49b6850ad
s390x
glibc-2.3.4-2.57.s390.rpm SHA-256: 033e70b121ad52f7f6c7f8e0b5d8a38be350f9c22d88416f72c0160a8ae31acb
glibc-2.3.4-2.57.s390x.rpm SHA-256: 306b3e5d77e0f61521b68dbbfa5640ad36bae8c7e13d46cdeaff425a54a4ca49
glibc-common-2.3.4-2.57.s390x.rpm SHA-256: 8426602aeef24e1f91884ea68927746c2f418a09b2943436c102ecdd04367789
glibc-devel-2.3.4-2.57.s390.rpm SHA-256: 949b7b2dfdf4a12071a8433dabc797bfa228fa39938ef730a770ccc253c03988
glibc-devel-2.3.4-2.57.s390x.rpm SHA-256: e5046c30305ae814ceed95a3de341f8d1632aef73e3ab07b294def363a8a0018
glibc-headers-2.3.4-2.57.s390x.rpm SHA-256: 33d81b47a7260434ad7cb89f8e7350afdfc138abebb862b7edfdd51eec7a4aab
glibc-profile-2.3.4-2.57.s390x.rpm SHA-256: 97e2d628671886dd39c1d56d4a409d085cb79d8e8216afad03fe41a61cf1b51d
glibc-utils-2.3.4-2.57.s390x.rpm SHA-256: 298d82cedbea95b4acac8a3e3a3fbe2b87b8f0ad8860d1847a5bd5d93bd0157e
nptl-devel-2.3.4-2.57.s390x.rpm SHA-256: 8abc0e063c002115852e16404f057458559bbb8f08aa55d019c1d5f197d43d2e
nscd-2.3.4-2.57.s390x.rpm SHA-256: 9ebebf4b161875b394f425c475b4e0687d9e997741031e2a90a46d1e47463031
s390
glibc-2.3.4-2.57.s390.rpm SHA-256: 033e70b121ad52f7f6c7f8e0b5d8a38be350f9c22d88416f72c0160a8ae31acb
glibc-common-2.3.4-2.57.s390.rpm SHA-256: 6d0fd80d996cf1707398063d9d08e59ae3f85e2561ac0c8fb2518133635cda79
glibc-devel-2.3.4-2.57.s390.rpm SHA-256: 949b7b2dfdf4a12071a8433dabc797bfa228fa39938ef730a770ccc253c03988
glibc-headers-2.3.4-2.57.s390.rpm SHA-256: d111b64bf1b43930aa3bebc6260c22bca3b1498c1b2d02949a7a829d7ef79bca
glibc-profile-2.3.4-2.57.s390.rpm SHA-256: 61085bcdbf0db1eb6233db63e065b8663cd3087438897e994a345461cf7bcd39
glibc-utils-2.3.4-2.57.s390.rpm SHA-256: 44b9205be72d39f91fa50b29183193049ea84960d5fd32cd8331a6f4afb1cfde
nptl-devel-2.3.4-2.57.s390.rpm SHA-256: 1a3d897554150f805cb39a009ef26ece0dc7d778f2e3791f07451b34eee0a77d
nscd-2.3.4-2.57.s390.rpm SHA-256: 0c1eae384252c0c9edb2b40994cb70801781bc1ac18d29b2a226fd3699462c7d

Red Hat Enterprise Linux for Power, big endian 4

SRPM
glibc-2.3.4-2.57.src.rpm SHA-256: c946f34d9c1861f53a038cbc64be43b5a17a40b3f7a58717b5066cd49b6850ad
ppc
glibc-2.3.4-2.57.ppc.rpm SHA-256: 03916db6ecc538fcb30d7e15171d856a8d1441e529920426337a401fa73261a9
glibc-2.3.4-2.57.ppc64.rpm SHA-256: 711f0d57080f0862c81c94181554528c21c6f27382d6cfe49c39228ecc86b300
glibc-common-2.3.4-2.57.ppc.rpm SHA-256: 76ddeeef9574dd9cb4a4a5fb32641efb0939807ec4a5f43a8d3fe273d248bd9e
glibc-devel-2.3.4-2.57.ppc.rpm SHA-256: b27aaa777f7505b285e353d87fb3a16b769e0f5508d26622fa0f3913f6712375
glibc-devel-2.3.4-2.57.ppc64.rpm SHA-256: cdbe04f7495aeb0f22526e695fce7ad84b86628735a680fdd2d022fcde191226
glibc-headers-2.3.4-2.57.ppc.rpm SHA-256: 9859bba3eace8f086deb470aa111def2ebb82eb051e92fedb207ba6857d51872
glibc-profile-2.3.4-2.57.ppc.rpm SHA-256: 8b83cc0a219d95187f362e480783f97a300ec98db4e00493779df026363ec3c1
glibc-utils-2.3.4-2.57.ppc.rpm SHA-256: 58364e776242a069979866ebfc05308635c3193a3dd72f62b367483cd378c07c
nptl-devel-2.3.4-2.57.ppc.rpm SHA-256: b6f08005278e174d22116b6e5e4324328a9f32d902fea0b17134f08c11368024
nscd-2.3.4-2.57.ppc.rpm SHA-256: a4089afc47bdecacc7dfb43ffd8dffab5b1340c680778d504076c91e281de556

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our <a href='http://www.redhat.com/en/about/privacy-policy' class='privacy-policy'>Privacy Statement</a> effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter