Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)
  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus
  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products

Quick links: redhat.com, Customer Portal, Red Hat's developer site, Red Hat's partner site.

  • You are here

    Red Hat

    Learn about our open source products, services, and company.

  • You are here

    Red Hat Customer Portal

    Get product support and knowledge from the open source experts.

  • You are here

    Red Hat Developer

    Read developer tutorials and download Red Hat software for cloud application development.

  • You are here

    Red Hat Partner Connect

    Get training, subscriptions, certifications, and more for partners to build, sell, and support customer solutions.

Products & tools

  • Ansible.com

    Learn about and try our IT automation product.
  • Red Hat Ecosystem Catalog

    Find hardware, software, and cloud providers―and download container images―certified to perform with Red Hat technologies.

Try, buy, & sell

  • Red Hat Hybrid Cloud Console

    Access technical how-tos, tutorials, and learning paths focused on Red Hat’s hybrid cloud managed services.
  • Red Hat Store

    Buy select Red Hat products and services online.

Events

  • Red Hat Summit and AnsibleFest

    Register for and learn about our annual open source IT industry event.
Red Hat Product Errata RHSA-2021:2813 - Security Advisory
Issued:
2021-07-20
Updated:
2021-07-20

RHSA-2021:2813 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: glibc security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for glibc is now available for Red Hat Enterprise Linux 7.4 Advanced Update Support, Red Hat Enterprise Linux 7.4 Telco Extended Update Support, and Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.

Security Fix(es):

  • glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern (CVE-2020-29573)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

For the update to take effect, all services linked to the glibc library must be restarted, or the system rebooted.

Affected Products

  • Red Hat Enterprise Linux Server - AUS 7.4 x86_64
  • Red Hat Enterprise Linux Server - TUS 7.4 x86_64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.4 x86_64

Fixes

  • BZ - 1905213 - CVE-2020-29573 glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern

CVEs

  • CVE-2020-29573

References

  • https://access.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server - AUS 7.4

SRPM
glibc-2.17-196.el7_4.4.src.rpm SHA-256: d01dcda133ba1ed22379178e30cc81c8576f414b51008cf726bb8288aa4de98d
x86_64
glibc-2.17-196.el7_4.4.i686.rpm SHA-256: cb7bc4551af8cb0fee9d3e6b91bea3e1c21d4a296da0fe8d0d467e557473602e
glibc-2.17-196.el7_4.4.x86_64.rpm SHA-256: 8dd6736b9461b02ec9946ce247618abe165d4c4e2f0aabd4ff98985dee97a39d
glibc-common-2.17-196.el7_4.4.x86_64.rpm SHA-256: 817bb29d74a615bf6f04fb0ff9fd6d418409f187a972736c0838af1ca9aa7621
glibc-debuginfo-2.17-196.el7_4.4.i686.rpm SHA-256: a40a918cc97626d0fa4b324e3a75c5c763232731256175314706f149a73ed110
glibc-debuginfo-2.17-196.el7_4.4.i686.rpm SHA-256: a40a918cc97626d0fa4b324e3a75c5c763232731256175314706f149a73ed110
glibc-debuginfo-2.17-196.el7_4.4.x86_64.rpm SHA-256: bccacabbf653180e4f319d94a139ab244459dda00ff18eb900e9a4839b96083c
glibc-debuginfo-2.17-196.el7_4.4.x86_64.rpm SHA-256: bccacabbf653180e4f319d94a139ab244459dda00ff18eb900e9a4839b96083c
glibc-debuginfo-common-2.17-196.el7_4.4.i686.rpm SHA-256: f43bb69f36616a7aa53afa7c62b59ad5369826d473af6ecac391474b0e6fbdc9
glibc-debuginfo-common-2.17-196.el7_4.4.i686.rpm SHA-256: f43bb69f36616a7aa53afa7c62b59ad5369826d473af6ecac391474b0e6fbdc9
glibc-debuginfo-common-2.17-196.el7_4.4.x86_64.rpm SHA-256: d5701be5eb0b02cd997b8fada97072eacd929400cb96b24a462b70d82739c4a1
glibc-debuginfo-common-2.17-196.el7_4.4.x86_64.rpm SHA-256: d5701be5eb0b02cd997b8fada97072eacd929400cb96b24a462b70d82739c4a1
glibc-devel-2.17-196.el7_4.4.i686.rpm SHA-256: e06c42625577cd989720eead0aae42819218cd9d35aebb2e86ba1f548affcb3e
glibc-devel-2.17-196.el7_4.4.x86_64.rpm SHA-256: 6b8d9640ddaa9797bb5bc60b92163925df9b66bbb2bdd39faa1e7da7bf4007f9
glibc-headers-2.17-196.el7_4.4.x86_64.rpm SHA-256: eb9486d69ff8720f74353edf9ff0489ddabd04d50bb4d561300d5b8fc391b1a7
glibc-static-2.17-196.el7_4.4.i686.rpm SHA-256: d2c87a81266c674f7c7a2a9b4c2ba03b5ac0ac6edec86208cbf66da5661675de
glibc-static-2.17-196.el7_4.4.x86_64.rpm SHA-256: fab8335c1b94271b29813d604d168d8d4a929221aa0b21258fdf6729704b5d69
glibc-utils-2.17-196.el7_4.4.x86_64.rpm SHA-256: 0e376f5ab757e553512fc19792f71e48d6b720ade660d5c7de7926cb914445d0
nscd-2.17-196.el7_4.4.x86_64.rpm SHA-256: 94acba05ff40340145b69796cc309e69e6e9ae8c59c295eecced22812e0fd7ae

Red Hat Enterprise Linux Server - TUS 7.4

SRPM
glibc-2.17-196.el7_4.4.src.rpm SHA-256: d01dcda133ba1ed22379178e30cc81c8576f414b51008cf726bb8288aa4de98d
x86_64
glibc-2.17-196.el7_4.4.i686.rpm SHA-256: cb7bc4551af8cb0fee9d3e6b91bea3e1c21d4a296da0fe8d0d467e557473602e
glibc-2.17-196.el7_4.4.x86_64.rpm SHA-256: 8dd6736b9461b02ec9946ce247618abe165d4c4e2f0aabd4ff98985dee97a39d
glibc-common-2.17-196.el7_4.4.x86_64.rpm SHA-256: 817bb29d74a615bf6f04fb0ff9fd6d418409f187a972736c0838af1ca9aa7621
glibc-debuginfo-2.17-196.el7_4.4.i686.rpm SHA-256: a40a918cc97626d0fa4b324e3a75c5c763232731256175314706f149a73ed110
glibc-debuginfo-2.17-196.el7_4.4.i686.rpm SHA-256: a40a918cc97626d0fa4b324e3a75c5c763232731256175314706f149a73ed110
glibc-debuginfo-2.17-196.el7_4.4.x86_64.rpm SHA-256: bccacabbf653180e4f319d94a139ab244459dda00ff18eb900e9a4839b96083c
glibc-debuginfo-2.17-196.el7_4.4.x86_64.rpm SHA-256: bccacabbf653180e4f319d94a139ab244459dda00ff18eb900e9a4839b96083c
glibc-debuginfo-common-2.17-196.el7_4.4.i686.rpm SHA-256: f43bb69f36616a7aa53afa7c62b59ad5369826d473af6ecac391474b0e6fbdc9
glibc-debuginfo-common-2.17-196.el7_4.4.i686.rpm SHA-256: f43bb69f36616a7aa53afa7c62b59ad5369826d473af6ecac391474b0e6fbdc9
glibc-debuginfo-common-2.17-196.el7_4.4.x86_64.rpm SHA-256: d5701be5eb0b02cd997b8fada97072eacd929400cb96b24a462b70d82739c4a1
glibc-debuginfo-common-2.17-196.el7_4.4.x86_64.rpm SHA-256: d5701be5eb0b02cd997b8fada97072eacd929400cb96b24a462b70d82739c4a1
glibc-devel-2.17-196.el7_4.4.i686.rpm SHA-256: e06c42625577cd989720eead0aae42819218cd9d35aebb2e86ba1f548affcb3e
glibc-devel-2.17-196.el7_4.4.x86_64.rpm SHA-256: 6b8d9640ddaa9797bb5bc60b92163925df9b66bbb2bdd39faa1e7da7bf4007f9
glibc-headers-2.17-196.el7_4.4.x86_64.rpm SHA-256: eb9486d69ff8720f74353edf9ff0489ddabd04d50bb4d561300d5b8fc391b1a7
glibc-static-2.17-196.el7_4.4.i686.rpm SHA-256: d2c87a81266c674f7c7a2a9b4c2ba03b5ac0ac6edec86208cbf66da5661675de
glibc-static-2.17-196.el7_4.4.x86_64.rpm SHA-256: fab8335c1b94271b29813d604d168d8d4a929221aa0b21258fdf6729704b5d69
glibc-utils-2.17-196.el7_4.4.x86_64.rpm SHA-256: 0e376f5ab757e553512fc19792f71e48d6b720ade660d5c7de7926cb914445d0
nscd-2.17-196.el7_4.4.x86_64.rpm SHA-256: 94acba05ff40340145b69796cc309e69e6e9ae8c59c295eecced22812e0fd7ae

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.4

SRPM
glibc-2.17-196.el7_4.4.src.rpm SHA-256: d01dcda133ba1ed22379178e30cc81c8576f414b51008cf726bb8288aa4de98d
ppc64le
glibc-2.17-196.el7_4.4.ppc64le.rpm SHA-256: 312710e84cfb0550801e5645f431276b37651ccd2394b0c8ebf38e386de41003
glibc-common-2.17-196.el7_4.4.ppc64le.rpm SHA-256: eaaaa6a71e74252f69a57d34b7f044e80d217c68e5842e16730326725ed8cf79
glibc-debuginfo-2.17-196.el7_4.4.ppc64le.rpm SHA-256: 424dc5530695c99ea845b926e69c6036d03d00bc496b33f77d5560119ff5644c
glibc-debuginfo-2.17-196.el7_4.4.ppc64le.rpm SHA-256: 424dc5530695c99ea845b926e69c6036d03d00bc496b33f77d5560119ff5644c
glibc-debuginfo-common-2.17-196.el7_4.4.ppc64le.rpm SHA-256: 2cdd7ffa4c16479da22390eddab5002c692601e8766483f28b6bb87750d1ff6b
glibc-debuginfo-common-2.17-196.el7_4.4.ppc64le.rpm SHA-256: 2cdd7ffa4c16479da22390eddab5002c692601e8766483f28b6bb87750d1ff6b
glibc-devel-2.17-196.el7_4.4.ppc64le.rpm SHA-256: 846bf14759adece3788396ebae07e629773ba37ce2ca33ba64502f877ebb9132
glibc-headers-2.17-196.el7_4.4.ppc64le.rpm SHA-256: 09e3fbb04ffad4cbcdd8807bac1234a8aba924b87e264e1402746bbd10d7aede
glibc-static-2.17-196.el7_4.4.ppc64le.rpm SHA-256: fbfb890d6b33473d6bc50fa57509b583beda18a6e4a82f5ec371e72e8882807b
glibc-utils-2.17-196.el7_4.4.ppc64le.rpm SHA-256: d862ac56b99aeba068733b999ac8f98004d7d36a8452d25f69b0b7840a737770
nscd-2.17-196.el7_4.4.ppc64le.rpm SHA-256: 51caa6f41dd334f22318444cacf3c881486e11d27e0ebdd983099a8496090f04

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.4

SRPM
glibc-2.17-196.el7_4.4.src.rpm SHA-256: d01dcda133ba1ed22379178e30cc81c8576f414b51008cf726bb8288aa4de98d
x86_64
glibc-2.17-196.el7_4.4.i686.rpm SHA-256: cb7bc4551af8cb0fee9d3e6b91bea3e1c21d4a296da0fe8d0d467e557473602e
glibc-2.17-196.el7_4.4.x86_64.rpm SHA-256: 8dd6736b9461b02ec9946ce247618abe165d4c4e2f0aabd4ff98985dee97a39d
glibc-common-2.17-196.el7_4.4.x86_64.rpm SHA-256: 817bb29d74a615bf6f04fb0ff9fd6d418409f187a972736c0838af1ca9aa7621
glibc-debuginfo-2.17-196.el7_4.4.i686.rpm SHA-256: a40a918cc97626d0fa4b324e3a75c5c763232731256175314706f149a73ed110
glibc-debuginfo-2.17-196.el7_4.4.i686.rpm SHA-256: a40a918cc97626d0fa4b324e3a75c5c763232731256175314706f149a73ed110
glibc-debuginfo-2.17-196.el7_4.4.x86_64.rpm SHA-256: bccacabbf653180e4f319d94a139ab244459dda00ff18eb900e9a4839b96083c
glibc-debuginfo-2.17-196.el7_4.4.x86_64.rpm SHA-256: bccacabbf653180e4f319d94a139ab244459dda00ff18eb900e9a4839b96083c
glibc-debuginfo-common-2.17-196.el7_4.4.i686.rpm SHA-256: f43bb69f36616a7aa53afa7c62b59ad5369826d473af6ecac391474b0e6fbdc9
glibc-debuginfo-common-2.17-196.el7_4.4.i686.rpm SHA-256: f43bb69f36616a7aa53afa7c62b59ad5369826d473af6ecac391474b0e6fbdc9
glibc-debuginfo-common-2.17-196.el7_4.4.x86_64.rpm SHA-256: d5701be5eb0b02cd997b8fada97072eacd929400cb96b24a462b70d82739c4a1
glibc-debuginfo-common-2.17-196.el7_4.4.x86_64.rpm SHA-256: d5701be5eb0b02cd997b8fada97072eacd929400cb96b24a462b70d82739c4a1
glibc-devel-2.17-196.el7_4.4.i686.rpm SHA-256: e06c42625577cd989720eead0aae42819218cd9d35aebb2e86ba1f548affcb3e
glibc-devel-2.17-196.el7_4.4.x86_64.rpm SHA-256: 6b8d9640ddaa9797bb5bc60b92163925df9b66bbb2bdd39faa1e7da7bf4007f9
glibc-headers-2.17-196.el7_4.4.x86_64.rpm SHA-256: eb9486d69ff8720f74353edf9ff0489ddabd04d50bb4d561300d5b8fc391b1a7
glibc-static-2.17-196.el7_4.4.i686.rpm SHA-256: d2c87a81266c674f7c7a2a9b4c2ba03b5ac0ac6edec86208cbf66da5661675de
glibc-static-2.17-196.el7_4.4.x86_64.rpm SHA-256: fab8335c1b94271b29813d604d168d8d4a929221aa0b21258fdf6729704b5d69
glibc-utils-2.17-196.el7_4.4.x86_64.rpm SHA-256: 0e376f5ab757e553512fc19792f71e48d6b720ade660d5c7de7926cb914445d0
nscd-2.17-196.el7_4.4.x86_64.rpm SHA-256: 94acba05ff40340145b69796cc309e69e6e9ae8c59c295eecced22812e0fd7ae

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility