- Issued:
- 2008-01-15
- Updated:
- 2008-01-15
RHBA-2008:0023 - Bug Fix Advisory
Synopsis
strace bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated strace packages that fix a bug are now available.
Description
The strace program intercepts and records the system calls that are called
and received by a running process.
While using strace on a multithreaded program, the "Ctrl-C" key
combination hanged strace, instead of terminating strace correctly. Note,
this behavior could also occur when tracing non-multithreaded programs. In
these updated packages the "Ctrl-C" key combination correctly terminates
strace.
Users are advised to upgrade to these updated packages, which resolve this
issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5 s390
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5 ppc
Fixes
- BZ - 385221 - [RHEL4 U2] strace don't terminate properly when CTRL-C key is pressed.
CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 4.5
SRPM | |
---|---|
strace-4.5.15-1.el4_5.2.src.rpm | SHA-256: d2ea384a7bf0a7e69f093f26fff7bca95b1b1661b504ae50b65edfe2b15e5e99 |
x86_64 | |
strace-4.5.15-1.el4_5.2.x86_64.rpm | SHA-256: 4cd87f26cac8ee7bf077523dbd1f970a0366066718f80d08af86e677c2b9ee19 |
strace-4.5.15-1.el4_5.2.x86_64.rpm | SHA-256: 4cd87f26cac8ee7bf077523dbd1f970a0366066718f80d08af86e677c2b9ee19 |
ia64 | |
strace-4.5.15-1.el4_5.2.i386.rpm | SHA-256: 96bea7e189024b3f87de79c4312d5a0cf14ad80c066318e962df4eef1c1ccb54 |
strace-4.5.15-1.el4_5.2.i386.rpm | SHA-256: 96bea7e189024b3f87de79c4312d5a0cf14ad80c066318e962df4eef1c1ccb54 |
strace-4.5.15-1.el4_5.2.ia64.rpm | SHA-256: bc17de860c6efcc2e41d828b449bbf4ed0cf49c0b92668d2c58018185b78aec8 |
strace-4.5.15-1.el4_5.2.ia64.rpm | SHA-256: bc17de860c6efcc2e41d828b449bbf4ed0cf49c0b92668d2c58018185b78aec8 |
i386 | |
strace-4.5.15-1.el4_5.2.i386.rpm | SHA-256: 96bea7e189024b3f87de79c4312d5a0cf14ad80c066318e962df4eef1c1ccb54 |
strace-4.5.15-1.el4_5.2.i386.rpm | SHA-256: 96bea7e189024b3f87de79c4312d5a0cf14ad80c066318e962df4eef1c1ccb54 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4.5
SRPM | |
---|---|
strace-4.5.15-1.el4_5.2.src.rpm | SHA-256: d2ea384a7bf0a7e69f093f26fff7bca95b1b1661b504ae50b65edfe2b15e5e99 |
s390x | |
strace-4.5.15-1.el4_5.2.s390x.rpm | SHA-256: f448908b94a68ea3b6ee2e06e25f6e74067665370c0d54dd3048981af165f57a |
s390 | |
strace-4.5.15-1.el4_5.2.s390.rpm | SHA-256: f80dad21d11f63a98fe2ff9c450b04a2a633858f7795fd95c3aa7730b5173419 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4.5
SRPM | |
---|---|
strace-4.5.15-1.el4_5.2.src.rpm | SHA-256: d2ea384a7bf0a7e69f093f26fff7bca95b1b1661b504ae50b65edfe2b15e5e99 |
ppc | |
strace-4.5.15-1.el4_5.2.ppc.rpm | SHA-256: 86abdc42a9698cc420ef490fb189b1ec1d3c5b390454616b4e8013eac7c2cac6 |
strace64-4.5.15-1.el4_5.2.ppc64.rpm | SHA-256: c198bc20ce8876dd0c5578be213afff65351c40e5d4a71e71a701f90a8b11644 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.