Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:0397 - Security Advisory
Issued:
2012-03-19
Updated:
2012-03-19

RHSA-2012:0397 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: glibc security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated glibc packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

The glibc packages provide the standard C and standard math libraries used
by multiple programs on the system. Without these libraries, the Linux
system cannot function correctly.

An integer overflow flaw was found in the implementation of the printf
functions family. This could allow an attacker to bypass FORTIFY_SOURCE
protections and execute arbitrary code using a format string flaw in an
application, even though these protections are expected to limit the impact
of such flaws to an application abort. (CVE-2012-0864)

All users of glibc are advised to upgrade to these updated packages, which
contain a patch to resolve this issue.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 794766 - CVE-2012-0864 glibc: FORTIFY_SOURCE format string protection bypass via "nargs" integer overflow

CVEs

  • CVE-2012-0864

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
glibc-2.5-81.el5_8.1.src.rpm SHA-256: cb608352974e86f82f577a1968cc8ed37828f95421b0d5801aaad67a637309aa
x86_64
glibc-2.5-81.el5_8.1.i686.rpm SHA-256: 82e0270b5296e7c24c0c40bca6cec2c32cf136dfad8b2dd6657e206fbd04adab
glibc-2.5-81.el5_8.1.x86_64.rpm SHA-256: b20c0cefdeef10d62f747c6b496a793e91c5fec62d7ab80dff494bdd49b85880
glibc-common-2.5-81.el5_8.1.x86_64.rpm SHA-256: 7f9d64ac12201d6ec11192cb9a34da786e95283da13a928fd514e4b441173638
glibc-debuginfo-2.5-81.el5_8.1.i386.rpm SHA-256: 644e75831987d36700460409eb2ff5a80760eeb193820d787c2c859af09bdc72
glibc-debuginfo-2.5-81.el5_8.1.i686.rpm SHA-256: 24ad15caaf79a8bcc7b8f40c9dacd51982648bbb5dd4b2610407e277761a6e54
glibc-debuginfo-2.5-81.el5_8.1.x86_64.rpm SHA-256: 1f60a01688ba8ef90fb0416525a5e75f76264e23db6341daa4bc3eb14c659043
glibc-debuginfo-common-2.5-81.el5_8.1.i386.rpm SHA-256: 12cc5f6d0cc82e8a92cc3421b1f64af5d473dcd9fa0b9707f6202744c8749de2
glibc-devel-2.5-81.el5_8.1.i386.rpm SHA-256: 6e53642ffabe9d1d5c4b6caf6d2f1138de72d2eff0c9ec7a6f6e98d276550253
glibc-devel-2.5-81.el5_8.1.x86_64.rpm SHA-256: 1ae76f17eb387cacff4a5e7da51a1fb0e9e6cdefba15c55b7fda174f9f3c216d
glibc-headers-2.5-81.el5_8.1.x86_64.rpm SHA-256: f9054c31406903d0460ecbd11d5f044de08035da979711c3fcb8e44edfa58829
glibc-utils-2.5-81.el5_8.1.x86_64.rpm SHA-256: c752ccc0a1178f73c88bf88eee1c4917ef7ceedab6a9af1d6158caba64c4cf4e
nscd-2.5-81.el5_8.1.x86_64.rpm SHA-256: b4409092073b043bf2d91dc6c761360153158b9625db5b625988db2a8cd84fdc
ia64
glibc-2.5-81.el5_8.1.i686.rpm SHA-256: 82e0270b5296e7c24c0c40bca6cec2c32cf136dfad8b2dd6657e206fbd04adab
glibc-2.5-81.el5_8.1.ia64.rpm SHA-256: 0f2486f12b076d1d4e6c7f8ef5c4b51fed5c3b453bbeb3ade79a5b5f951c3c77
glibc-common-2.5-81.el5_8.1.ia64.rpm SHA-256: 729345c513ee4708a16952a4a5149be7ddf53fcd65d1202358228613fb72c4e0
glibc-debuginfo-2.5-81.el5_8.1.i686.rpm SHA-256: 24ad15caaf79a8bcc7b8f40c9dacd51982648bbb5dd4b2610407e277761a6e54
glibc-debuginfo-2.5-81.el5_8.1.ia64.rpm SHA-256: 446050d403f48e76c81121c613e03b255ba71075cfd06e2387b099d1fdee6c76
glibc-devel-2.5-81.el5_8.1.ia64.rpm SHA-256: 46aee43d2ef0795195d57a094011c753518f0b2a09a295a167d3148e6e38d821
glibc-headers-2.5-81.el5_8.1.ia64.rpm SHA-256: c206c8f7fd5eca672d84672ed2e3a397bbfb2d5f3f521b150139ad98009c63e6
glibc-utils-2.5-81.el5_8.1.ia64.rpm SHA-256: c0818a309b9ddd345442690ab0754fd885ba3276c8c926f74ec1ba981c573934
nscd-2.5-81.el5_8.1.ia64.rpm SHA-256: cb59006d88b0ca0206a1ba9186628c1c1cde5d3ed619e024fa830d81bc99c894
i386
glibc-2.5-81.el5_8.1.i386.rpm SHA-256: 068efa6ac0776caa8b7a7d4eda628310668c3ffe9c7063476c568c4715bf6f82
glibc-2.5-81.el5_8.1.i686.rpm SHA-256: 82e0270b5296e7c24c0c40bca6cec2c32cf136dfad8b2dd6657e206fbd04adab
glibc-common-2.5-81.el5_8.1.i386.rpm SHA-256: 3ed0c191cfd57e923afe796ce0cdce71e8b711cd9dc9f322a73dc1dbf18dbefe
glibc-debuginfo-2.5-81.el5_8.1.i386.rpm SHA-256: 644e75831987d36700460409eb2ff5a80760eeb193820d787c2c859af09bdc72
glibc-debuginfo-2.5-81.el5_8.1.i686.rpm SHA-256: 24ad15caaf79a8bcc7b8f40c9dacd51982648bbb5dd4b2610407e277761a6e54
glibc-debuginfo-common-2.5-81.el5_8.1.i386.rpm SHA-256: 12cc5f6d0cc82e8a92cc3421b1f64af5d473dcd9fa0b9707f6202744c8749de2
glibc-devel-2.5-81.el5_8.1.i386.rpm SHA-256: 6e53642ffabe9d1d5c4b6caf6d2f1138de72d2eff0c9ec7a6f6e98d276550253
glibc-headers-2.5-81.el5_8.1.i386.rpm SHA-256: 7408beb7c3b26fd0673a32a803eec37c7d94a119c467ab5e633f974690ac57c4
glibc-utils-2.5-81.el5_8.1.i386.rpm SHA-256: e92bc541031245d8dc874e0288767aed036e9436a0d59204fd1f5cd45c0ecd9b
nscd-2.5-81.el5_8.1.i386.rpm SHA-256: f63f4f6cf0c006a3c4b3d49c4db69c0a460c52a6039a1c6b6680e314d62ea9d7

Red Hat Enterprise Linux Workstation 5

SRPM
glibc-2.5-81.el5_8.1.src.rpm SHA-256: cb608352974e86f82f577a1968cc8ed37828f95421b0d5801aaad67a637309aa
x86_64
glibc-2.5-81.el5_8.1.i686.rpm SHA-256: 82e0270b5296e7c24c0c40bca6cec2c32cf136dfad8b2dd6657e206fbd04adab
glibc-2.5-81.el5_8.1.x86_64.rpm SHA-256: b20c0cefdeef10d62f747c6b496a793e91c5fec62d7ab80dff494bdd49b85880
glibc-common-2.5-81.el5_8.1.x86_64.rpm SHA-256: 7f9d64ac12201d6ec11192cb9a34da786e95283da13a928fd514e4b441173638
glibc-debuginfo-2.5-81.el5_8.1.i386.rpm SHA-256: 644e75831987d36700460409eb2ff5a80760eeb193820d787c2c859af09bdc72
glibc-debuginfo-2.5-81.el5_8.1.i686.rpm SHA-256: 24ad15caaf79a8bcc7b8f40c9dacd51982648bbb5dd4b2610407e277761a6e54
glibc-debuginfo-2.5-81.el5_8.1.x86_64.rpm SHA-256: 1f60a01688ba8ef90fb0416525a5e75f76264e23db6341daa4bc3eb14c659043
glibc-debuginfo-common-2.5-81.el5_8.1.i386.rpm SHA-256: 12cc5f6d0cc82e8a92cc3421b1f64af5d473dcd9fa0b9707f6202744c8749de2
glibc-devel-2.5-81.el5_8.1.i386.rpm SHA-256: 6e53642ffabe9d1d5c4b6caf6d2f1138de72d2eff0c9ec7a6f6e98d276550253
glibc-devel-2.5-81.el5_8.1.x86_64.rpm SHA-256: 1ae76f17eb387cacff4a5e7da51a1fb0e9e6cdefba15c55b7fda174f9f3c216d
glibc-headers-2.5-81.el5_8.1.x86_64.rpm SHA-256: f9054c31406903d0460ecbd11d5f044de08035da979711c3fcb8e44edfa58829
glibc-utils-2.5-81.el5_8.1.x86_64.rpm SHA-256: c752ccc0a1178f73c88bf88eee1c4917ef7ceedab6a9af1d6158caba64c4cf4e
nscd-2.5-81.el5_8.1.x86_64.rpm SHA-256: b4409092073b043bf2d91dc6c761360153158b9625db5b625988db2a8cd84fdc
i386
glibc-2.5-81.el5_8.1.i386.rpm SHA-256: 068efa6ac0776caa8b7a7d4eda628310668c3ffe9c7063476c568c4715bf6f82
glibc-2.5-81.el5_8.1.i686.rpm SHA-256: 82e0270b5296e7c24c0c40bca6cec2c32cf136dfad8b2dd6657e206fbd04adab
glibc-common-2.5-81.el5_8.1.i386.rpm SHA-256: 3ed0c191cfd57e923afe796ce0cdce71e8b711cd9dc9f322a73dc1dbf18dbefe
glibc-debuginfo-2.5-81.el5_8.1.i386.rpm SHA-256: 644e75831987d36700460409eb2ff5a80760eeb193820d787c2c859af09bdc72
glibc-debuginfo-2.5-81.el5_8.1.i686.rpm SHA-256: 24ad15caaf79a8bcc7b8f40c9dacd51982648bbb5dd4b2610407e277761a6e54
glibc-debuginfo-common-2.5-81.el5_8.1.i386.rpm SHA-256: 12cc5f6d0cc82e8a92cc3421b1f64af5d473dcd9fa0b9707f6202744c8749de2
glibc-devel-2.5-81.el5_8.1.i386.rpm SHA-256: 6e53642ffabe9d1d5c4b6caf6d2f1138de72d2eff0c9ec7a6f6e98d276550253
glibc-headers-2.5-81.el5_8.1.i386.rpm SHA-256: 7408beb7c3b26fd0673a32a803eec37c7d94a119c467ab5e633f974690ac57c4
glibc-utils-2.5-81.el5_8.1.i386.rpm SHA-256: e92bc541031245d8dc874e0288767aed036e9436a0d59204fd1f5cd45c0ecd9b
nscd-2.5-81.el5_8.1.i386.rpm SHA-256: f63f4f6cf0c006a3c4b3d49c4db69c0a460c52a6039a1c6b6680e314d62ea9d7

Red Hat Enterprise Linux Desktop 5

SRPM
glibc-2.5-81.el5_8.1.src.rpm SHA-256: cb608352974e86f82f577a1968cc8ed37828f95421b0d5801aaad67a637309aa
x86_64
glibc-2.5-81.el5_8.1.i686.rpm SHA-256: 82e0270b5296e7c24c0c40bca6cec2c32cf136dfad8b2dd6657e206fbd04adab
glibc-2.5-81.el5_8.1.x86_64.rpm SHA-256: b20c0cefdeef10d62f747c6b496a793e91c5fec62d7ab80dff494bdd49b85880
glibc-common-2.5-81.el5_8.1.x86_64.rpm SHA-256: 7f9d64ac12201d6ec11192cb9a34da786e95283da13a928fd514e4b441173638
glibc-debuginfo-2.5-81.el5_8.1.i386.rpm SHA-256: 644e75831987d36700460409eb2ff5a80760eeb193820d787c2c859af09bdc72
glibc-debuginfo-2.5-81.el5_8.1.i686.rpm SHA-256: 24ad15caaf79a8bcc7b8f40c9dacd51982648bbb5dd4b2610407e277761a6e54
glibc-debuginfo-2.5-81.el5_8.1.x86_64.rpm SHA-256: 1f60a01688ba8ef90fb0416525a5e75f76264e23db6341daa4bc3eb14c659043
glibc-debuginfo-common-2.5-81.el5_8.1.i386.rpm SHA-256: 12cc5f6d0cc82e8a92cc3421b1f64af5d473dcd9fa0b9707f6202744c8749de2
glibc-devel-2.5-81.el5_8.1.i386.rpm SHA-256: 6e53642ffabe9d1d5c4b6caf6d2f1138de72d2eff0c9ec7a6f6e98d276550253
glibc-devel-2.5-81.el5_8.1.x86_64.rpm SHA-256: 1ae76f17eb387cacff4a5e7da51a1fb0e9e6cdefba15c55b7fda174f9f3c216d
glibc-headers-2.5-81.el5_8.1.x86_64.rpm SHA-256: f9054c31406903d0460ecbd11d5f044de08035da979711c3fcb8e44edfa58829
glibc-utils-2.5-81.el5_8.1.x86_64.rpm SHA-256: c752ccc0a1178f73c88bf88eee1c4917ef7ceedab6a9af1d6158caba64c4cf4e
nscd-2.5-81.el5_8.1.x86_64.rpm SHA-256: b4409092073b043bf2d91dc6c761360153158b9625db5b625988db2a8cd84fdc
i386
glibc-2.5-81.el5_8.1.i386.rpm SHA-256: 068efa6ac0776caa8b7a7d4eda628310668c3ffe9c7063476c568c4715bf6f82
glibc-2.5-81.el5_8.1.i686.rpm SHA-256: 82e0270b5296e7c24c0c40bca6cec2c32cf136dfad8b2dd6657e206fbd04adab
glibc-common-2.5-81.el5_8.1.i386.rpm SHA-256: 3ed0c191cfd57e923afe796ce0cdce71e8b711cd9dc9f322a73dc1dbf18dbefe
glibc-debuginfo-2.5-81.el5_8.1.i386.rpm SHA-256: 644e75831987d36700460409eb2ff5a80760eeb193820d787c2c859af09bdc72
glibc-debuginfo-2.5-81.el5_8.1.i686.rpm SHA-256: 24ad15caaf79a8bcc7b8f40c9dacd51982648bbb5dd4b2610407e277761a6e54
glibc-debuginfo-common-2.5-81.el5_8.1.i386.rpm SHA-256: 12cc5f6d0cc82e8a92cc3421b1f64af5d473dcd9fa0b9707f6202744c8749de2
glibc-devel-2.5-81.el5_8.1.i386.rpm SHA-256: 6e53642ffabe9d1d5c4b6caf6d2f1138de72d2eff0c9ec7a6f6e98d276550253
glibc-headers-2.5-81.el5_8.1.i386.rpm SHA-256: 7408beb7c3b26fd0673a32a803eec37c7d94a119c467ab5e633f974690ac57c4
glibc-utils-2.5-81.el5_8.1.i386.rpm SHA-256: e92bc541031245d8dc874e0288767aed036e9436a0d59204fd1f5cd45c0ecd9b
nscd-2.5-81.el5_8.1.i386.rpm SHA-256: f63f4f6cf0c006a3c4b3d49c4db69c0a460c52a6039a1c6b6680e314d62ea9d7

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
glibc-2.5-81.el5_8.1.src.rpm SHA-256: cb608352974e86f82f577a1968cc8ed37828f95421b0d5801aaad67a637309aa
s390x
glibc-2.5-81.el5_8.1.s390.rpm SHA-256: 88e47742d2b208fa98de1c0abf2487970a405066a578d9592ccf412c41281232
glibc-2.5-81.el5_8.1.s390x.rpm SHA-256: b08c1c084e3953ad49f9e722d8b683541d682c5eedbde4c89056b6dedd09b325
glibc-common-2.5-81.el5_8.1.s390x.rpm SHA-256: 2d17e9d484a39faf5eb7cfb74b76bb4f1eb94d99c263ba96c45eb7947bbef7d9
glibc-debuginfo-2.5-81.el5_8.1.s390.rpm SHA-256: b5af02f7ddceb9823f257820b7a42c23dcd4a3bb5bafbf7ab3a03be88f5d6d89
glibc-debuginfo-2.5-81.el5_8.1.s390x.rpm SHA-256: 4932c46ddd3264ffd5eea3ff7099e7fcd3ac55b1827759cebdc458a0a052a9a0
glibc-devel-2.5-81.el5_8.1.s390.rpm SHA-256: 5b7140468b1c18eaf2f7b6219ae90473e412b3c712654b556620af0b38ffbed1
glibc-devel-2.5-81.el5_8.1.s390x.rpm SHA-256: d5ea17b0d9f1478521e869ff6207ee0a86cc939ab42a97b791cb6a954252fe88
glibc-headers-2.5-81.el5_8.1.s390x.rpm SHA-256: 0177aef565def925f3c875f6daae3f462b01a1b3cb80a6a7459ec1ffbfd7bc1f
glibc-utils-2.5-81.el5_8.1.s390x.rpm SHA-256: ea8483dcf15362b360e71e67a8a148e7e792c0cc14e4d09f1a709fc31f1d107e
nscd-2.5-81.el5_8.1.s390x.rpm SHA-256: 032676a0c189333827c962a61fd64053f42e6c78c55cb5cf3c8629060c5ffb2a

Red Hat Enterprise Linux for Power, big endian 5

SRPM
glibc-2.5-81.el5_8.1.src.rpm SHA-256: cb608352974e86f82f577a1968cc8ed37828f95421b0d5801aaad67a637309aa
ppc
glibc-2.5-81.el5_8.1.ppc.rpm SHA-256: f63304a9b4b1104283f41011f32d8a02efc356c98f3d2062faaf6d2c29d50b08
glibc-2.5-81.el5_8.1.ppc64.rpm SHA-256: 0e9553614a09bb324b11355bb319dd87baad2dc166e4852fafbaf9ffda74e6eb
glibc-common-2.5-81.el5_8.1.ppc.rpm SHA-256: b46e17cd2311906656852e6719c9176e30b1e2677d7b64470a90e29837021edf
glibc-debuginfo-2.5-81.el5_8.1.ppc.rpm SHA-256: b2f802b9bc57972c8401107e7817ac706d6ce19f1cc2e288282e3752ea482f6b
glibc-debuginfo-2.5-81.el5_8.1.ppc64.rpm SHA-256: 20d08e6d138f095c55eb832033d5fa178d482f2033bc1b0a55ef8e21ccb8e9cc
glibc-devel-2.5-81.el5_8.1.ppc.rpm SHA-256: f64674ab4db87f903414de966593de4fa0cff720e781aeaf69f9faee42e6a7c0
glibc-devel-2.5-81.el5_8.1.ppc64.rpm SHA-256: 7db858eea008ebd0b21299b08f62195133ac72b53ff516f43672a80101a25f81
glibc-headers-2.5-81.el5_8.1.ppc.rpm SHA-256: 8a98dc084de4dda06bd45db1c683ef40a2fbca89b2f06d689f06532dfc50430c
glibc-utils-2.5-81.el5_8.1.ppc.rpm SHA-256: 4f3aaf78be9f35fc0be150476c350ece8b117b95e99189a202bb0d8ff468318d
nscd-2.5-81.el5_8.1.ppc.rpm SHA-256: 26252251c49167e1c364e597c1b30ba64acd456256e86f9c477dec71cef2a9ac

Red Hat Enterprise Linux Server from RHUI 5

SRPM
glibc-2.5-81.el5_8.1.src.rpm SHA-256: cb608352974e86f82f577a1968cc8ed37828f95421b0d5801aaad67a637309aa
x86_64
glibc-2.5-81.el5_8.1.i686.rpm SHA-256: 82e0270b5296e7c24c0c40bca6cec2c32cf136dfad8b2dd6657e206fbd04adab
glibc-2.5-81.el5_8.1.x86_64.rpm SHA-256: b20c0cefdeef10d62f747c6b496a793e91c5fec62d7ab80dff494bdd49b85880
glibc-common-2.5-81.el5_8.1.x86_64.rpm SHA-256: 7f9d64ac12201d6ec11192cb9a34da786e95283da13a928fd514e4b441173638
glibc-debuginfo-2.5-81.el5_8.1.i386.rpm SHA-256: 644e75831987d36700460409eb2ff5a80760eeb193820d787c2c859af09bdc72
glibc-debuginfo-2.5-81.el5_8.1.i686.rpm SHA-256: 24ad15caaf79a8bcc7b8f40c9dacd51982648bbb5dd4b2610407e277761a6e54
glibc-debuginfo-2.5-81.el5_8.1.x86_64.rpm SHA-256: 1f60a01688ba8ef90fb0416525a5e75f76264e23db6341daa4bc3eb14c659043
glibc-debuginfo-common-2.5-81.el5_8.1.i386.rpm SHA-256: 12cc5f6d0cc82e8a92cc3421b1f64af5d473dcd9fa0b9707f6202744c8749de2
glibc-devel-2.5-81.el5_8.1.i386.rpm SHA-256: 6e53642ffabe9d1d5c4b6caf6d2f1138de72d2eff0c9ec7a6f6e98d276550253
glibc-devel-2.5-81.el5_8.1.x86_64.rpm SHA-256: 1ae76f17eb387cacff4a5e7da51a1fb0e9e6cdefba15c55b7fda174f9f3c216d
glibc-headers-2.5-81.el5_8.1.x86_64.rpm SHA-256: f9054c31406903d0460ecbd11d5f044de08035da979711c3fcb8e44edfa58829
glibc-utils-2.5-81.el5_8.1.x86_64.rpm SHA-256: c752ccc0a1178f73c88bf88eee1c4917ef7ceedab6a9af1d6158caba64c4cf4e
nscd-2.5-81.el5_8.1.x86_64.rpm SHA-256: b4409092073b043bf2d91dc6c761360153158b9625db5b625988db2a8cd84fdc
i386
glibc-2.5-81.el5_8.1.i386.rpm SHA-256: 068efa6ac0776caa8b7a7d4eda628310668c3ffe9c7063476c568c4715bf6f82
glibc-2.5-81.el5_8.1.i686.rpm SHA-256: 82e0270b5296e7c24c0c40bca6cec2c32cf136dfad8b2dd6657e206fbd04adab
glibc-common-2.5-81.el5_8.1.i386.rpm SHA-256: 3ed0c191cfd57e923afe796ce0cdce71e8b711cd9dc9f322a73dc1dbf18dbefe
glibc-debuginfo-2.5-81.el5_8.1.i386.rpm SHA-256: 644e75831987d36700460409eb2ff5a80760eeb193820d787c2c859af09bdc72
glibc-debuginfo-2.5-81.el5_8.1.i686.rpm SHA-256: 24ad15caaf79a8bcc7b8f40c9dacd51982648bbb5dd4b2610407e277761a6e54
glibc-debuginfo-common-2.5-81.el5_8.1.i386.rpm SHA-256: 12cc5f6d0cc82e8a92cc3421b1f64af5d473dcd9fa0b9707f6202744c8749de2
glibc-devel-2.5-81.el5_8.1.i386.rpm SHA-256: 6e53642ffabe9d1d5c4b6caf6d2f1138de72d2eff0c9ec7a6f6e98d276550253
glibc-headers-2.5-81.el5_8.1.i386.rpm SHA-256: 7408beb7c3b26fd0673a32a803eec37c7d94a119c467ab5e633f974690ac57c4
glibc-utils-2.5-81.el5_8.1.i386.rpm SHA-256: e92bc541031245d8dc874e0288767aed036e9436a0d59204fd1f5cd45c0ecd9b
nscd-2.5-81.el5_8.1.i386.rpm SHA-256: f63f4f6cf0c006a3c4b3d49c4db69c0a460c52a6039a1c6b6680e314d62ea9d7

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility