- Issued:
- 2009-05-18
- Updated:
- 2009-05-18
RHBA-2009:1015 - Bug Fix Advisory
Synopsis
gdb bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated gdb package that fixes various bugs is now available.
Description
The GNU debugger, gdb, allows the debugging of programs written in C, C++,
and other languages by executing them in a controlled fashion and then
printing out their data.
This updated package addresses the following issues:
- Placing a breakpoint to program having some parts compiled without
debugging information (as provided by "gcc -g") could put the breakpoint at
incorrect place. The updated GDB places the breakpoint where the user
requested even for code without debugging information present. Note: the
program still must not have been stripped by the strip program. (BZ#442888)
- Debugging code compiled by the default C compiler of RHEL-4 (gcc) could
cause a GDB segmentation fault if the debugging information incorrectly
references a frame base which is not being defined by this debugging
information. The updated GDB writes an error message and continues to run.
Such code can be debugged correctly by using the alternative RHEL-4 C
compiler gcc4. (BZ#466222)
- On s390 and s390x architectures loading a core file of program using
shared libraries currently being prelinked at a different address than in
the time of the core dump could make the library not available for
investigation. The different address of a shared library may occur due to a
new prelink run from crond or by transferring the core file from a
different machine. The updated GDB properly displays the shared library
code for debugging notwithstanding its current prelinked address.
(BZ#468213)
- GDB could not backtrace through signal handler for i386 processes on
x86_64 kernel running on AMD CPUs. vDSO32 uses there a syscall instruction
for performance reasons which was not used on native i386 systems before.
The update GDB properly backtraces through signal handler even in this
case. (BZ#485508)
All users of gdb should upgrade to this updated package, which contains
backported patches to resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 442888 - gdb terminates with a segfault when stepping though a test application
- BZ - 466222 - gdb fails to set breakpoints
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
gdb-6.3.0.0-1.162.el4.src.rpm | SHA-256: e0780b8e6841e87430d1f95248300b5bc9f627b46e9c817601e95c331490d8a1 |
x86_64 | |
gdb-6.3.0.0-1.162.el4.x86_64.rpm | SHA-256: 13bb3277b2f29ce5773b53392083052fa9e5767cd70a5dcc917596eb355b4d41 |
gdb-6.3.0.0-1.162.el4.x86_64.rpm | SHA-256: 13bb3277b2f29ce5773b53392083052fa9e5767cd70a5dcc917596eb355b4d41 |
ia64 | |
gdb-6.3.0.0-1.162.el4.i386.rpm | SHA-256: 82005e117d3c2493e03bce02a67ceaa31cef0636943d1b6652f2b43d5d349fe1 |
gdb-6.3.0.0-1.162.el4.i386.rpm | SHA-256: 82005e117d3c2493e03bce02a67ceaa31cef0636943d1b6652f2b43d5d349fe1 |
gdb-6.3.0.0-1.162.el4.ia64.rpm | SHA-256: d51d2e9ba162addd1608e8cdc18f6ac2677417ce6fa48b9aadf3c218f13b4a31 |
gdb-6.3.0.0-1.162.el4.ia64.rpm | SHA-256: d51d2e9ba162addd1608e8cdc18f6ac2677417ce6fa48b9aadf3c218f13b4a31 |
i386 | |
gdb-6.3.0.0-1.162.el4.i386.rpm | SHA-256: 82005e117d3c2493e03bce02a67ceaa31cef0636943d1b6652f2b43d5d349fe1 |
gdb-6.3.0.0-1.162.el4.i386.rpm | SHA-256: 82005e117d3c2493e03bce02a67ceaa31cef0636943d1b6652f2b43d5d349fe1 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
gdb-6.3.0.0-1.162.el4.src.rpm | SHA-256: e0780b8e6841e87430d1f95248300b5bc9f627b46e9c817601e95c331490d8a1 |
x86_64 | |
gdb-6.3.0.0-1.162.el4.x86_64.rpm | SHA-256: 13bb3277b2f29ce5773b53392083052fa9e5767cd70a5dcc917596eb355b4d41 |
ia64 | |
gdb-6.3.0.0-1.162.el4.i386.rpm | SHA-256: 82005e117d3c2493e03bce02a67ceaa31cef0636943d1b6652f2b43d5d349fe1 |
gdb-6.3.0.0-1.162.el4.ia64.rpm | SHA-256: d51d2e9ba162addd1608e8cdc18f6ac2677417ce6fa48b9aadf3c218f13b4a31 |
i386 | |
gdb-6.3.0.0-1.162.el4.i386.rpm | SHA-256: 82005e117d3c2493e03bce02a67ceaa31cef0636943d1b6652f2b43d5d349fe1 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
gdb-6.3.0.0-1.162.el4.src.rpm | SHA-256: e0780b8e6841e87430d1f95248300b5bc9f627b46e9c817601e95c331490d8a1 |
x86_64 | |
gdb-6.3.0.0-1.162.el4.x86_64.rpm | SHA-256: 13bb3277b2f29ce5773b53392083052fa9e5767cd70a5dcc917596eb355b4d41 |
i386 | |
gdb-6.3.0.0-1.162.el4.i386.rpm | SHA-256: 82005e117d3c2493e03bce02a67ceaa31cef0636943d1b6652f2b43d5d349fe1 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
gdb-6.3.0.0-1.162.el4.src.rpm | SHA-256: e0780b8e6841e87430d1f95248300b5bc9f627b46e9c817601e95c331490d8a1 |
s390x | |
gdb-6.3.0.0-1.162.el4.s390x.rpm | SHA-256: 7977bba7a5f1051638ef50246991fd2e2c2a220e567ff1d5f482f157ffc75728 |
s390 | |
gdb-6.3.0.0-1.162.el4.s390.rpm | SHA-256: 0bf40ea7fc907a6d6c31b9e06e5b5bf7b45751ee2d9542ef082bfa75abaee045 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
gdb-6.3.0.0-1.162.el4.src.rpm | SHA-256: e0780b8e6841e87430d1f95248300b5bc9f627b46e9c817601e95c331490d8a1 |
ppc | |
gdb-6.3.0.0-1.162.el4.ppc64.rpm | SHA-256: 1295362edc6fa577664eae3a3ead83c59caf0df01e51c96663929d7aa991e550 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.