Skip to navigation

Bug Fix Advisory gdb bug fix update

Advisory: RHBA-2011:0186-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-01-31
Last updated on: 2011-01-31
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.6.z server)
Red Hat Enterprise Linux Long Life (v. 5.6 server)

Details

An updated gdb package that fixes a bug is now available for Red Hat Enterprise
Linux 5.

The GNU Debugger, GDB, allows the debugging of programs written in C, C++, and
other languages by executing them in a controlled fashion and then printing out
their data.

This update fixes the following bug:

* Previously, a change to the list of shared libraries could corrupt the
internal "bpstat" structure. Consequent to this, typing the "info program"
command at a GDB prompt could cause the utility to terminate unexpectedly with a
segmentation fault. This update ensures that the "bpstat" structure always
contains the correct data, and running the "info program" command no longer
causes the debugger to crash. (BZ#669636)

All users of gdb are advised to upgrade to this updated package, which resolves
this issue.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
gdb-7.0.1-32.el5_6.2.src.rpm
File outdated by:  RHBA-2012:1248
    MD5: 6dd19b8c9cc0af802b25fee7da0f7620
SHA-256: 80ad721da6222edbafb84dabb070cdda9012e4221302d051d52c2194784e5777
 
IA-32:
gdb-7.0.1-32.el5_6.2.i386.rpm
File outdated by:  RHBA-2013:0044
    MD5: 747c21386e7dc89d1fddfaa3eacc9b1d
SHA-256: 85fb5da696e87e27699c12066e5e410bd814282dc60341de09756661e198beb3
 
IA-64:
gdb-7.0.1-32.el5_6.2.i386.rpm
File outdated by:  RHBA-2013:0044
    MD5: 747c21386e7dc89d1fddfaa3eacc9b1d
SHA-256: 85fb5da696e87e27699c12066e5e410bd814282dc60341de09756661e198beb3
gdb-7.0.1-32.el5_6.2.ia64.rpm
File outdated by:  RHBA-2013:0044
    MD5: d45de832012cccf5c69f73285c177ce7
SHA-256: 94cb31f158cb9a3ab1128e3a5b9369b16ed6c0e67a76e3c9671ba92b05c17a6e
 
PPC:
gdb-7.0.1-32.el5_6.2.ppc64.rpm
File outdated by:  RHBA-2013:0044
    MD5: 4a8a3fbb12d02b95c38d3a3666ab2140
SHA-256: d2e980d7e38f6a423dc2d0817865bffc1aafb6847489b5991c87d22b9004fc23
 
s390x:
gdb-7.0.1-32.el5_6.2.s390x.rpm
File outdated by:  RHBA-2013:0044
    MD5: 672e8901cd563980743e061e5b45a776
SHA-256: 277799526234688cf04a45ff2476ddbfcea39dd23895f18fd915d623773026cb
 
x86_64:
gdb-7.0.1-32.el5_6.2.x86_64.rpm
File outdated by:  RHBA-2013:0044
    MD5: 70c395c67129d4b60c8f453930590340
SHA-256: 02162c97ce666032e08d19b81c75738af2e40de45ce6922728df63875eb323b6
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
gdb-7.0.1-32.el5_6.2.src.rpm
File outdated by:  RHBA-2012:1248
    MD5: 6dd19b8c9cc0af802b25fee7da0f7620
SHA-256: 80ad721da6222edbafb84dabb070cdda9012e4221302d051d52c2194784e5777
 
IA-32:
gdb-7.0.1-32.el5_6.2.i386.rpm
File outdated by:  RHBA-2013:0044
    MD5: 747c21386e7dc89d1fddfaa3eacc9b1d
SHA-256: 85fb5da696e87e27699c12066e5e410bd814282dc60341de09756661e198beb3
 
x86_64:
gdb-7.0.1-32.el5_6.2.x86_64.rpm
File outdated by:  RHBA-2013:0044
    MD5: 70c395c67129d4b60c8f453930590340
SHA-256: 02162c97ce666032e08d19b81c75738af2e40de45ce6922728df63875eb323b6
 
Red Hat Enterprise Linux EUS (v. 5.6.z server)

SRPMS:
gdb-7.0.1-32.el5_6.2.src.rpm
File outdated by:  RHBA-2012:1248
    MD5: 6dd19b8c9cc0af802b25fee7da0f7620
SHA-256: 80ad721da6222edbafb84dabb070cdda9012e4221302d051d52c2194784e5777
 
IA-32:
gdb-7.0.1-32.el5_6.2.i386.rpm
File outdated by:  RHBA-2012:1248
    MD5: 747c21386e7dc89d1fddfaa3eacc9b1d
SHA-256: 85fb5da696e87e27699c12066e5e410bd814282dc60341de09756661e198beb3
 
IA-64:
gdb-7.0.1-32.el5_6.2.i386.rpm
File outdated by:  RHBA-2012:1248
    MD5: 747c21386e7dc89d1fddfaa3eacc9b1d
SHA-256: 85fb5da696e87e27699c12066e5e410bd814282dc60341de09756661e198beb3
gdb-7.0.1-32.el5_6.2.ia64.rpm
File outdated by:  RHBA-2012:1248
    MD5: d45de832012cccf5c69f73285c177ce7
SHA-256: 94cb31f158cb9a3ab1128e3a5b9369b16ed6c0e67a76e3c9671ba92b05c17a6e
 
PPC:
gdb-7.0.1-32.el5_6.2.ppc64.rpm
File outdated by:  RHBA-2012:1248
    MD5: 4a8a3fbb12d02b95c38d3a3666ab2140
SHA-256: d2e980d7e38f6a423dc2d0817865bffc1aafb6847489b5991c87d22b9004fc23
 
s390x:
gdb-7.0.1-32.el5_6.2.s390x.rpm
File outdated by:  RHBA-2012:1248
    MD5: 672e8901cd563980743e061e5b45a776
SHA-256: 277799526234688cf04a45ff2476ddbfcea39dd23895f18fd915d623773026cb
 
x86_64:
gdb-7.0.1-32.el5_6.2.x86_64.rpm
File outdated by:  RHBA-2012:1248
    MD5: 70c395c67129d4b60c8f453930590340
SHA-256: 02162c97ce666032e08d19b81c75738af2e40de45ce6922728df63875eb323b6
 
Red Hat Enterprise Linux Long Life (v. 5.6 server)

SRPMS:
gdb-7.0.1-32.el5_6.2.src.rpm
File outdated by:  RHBA-2012:1248
    MD5: 6dd19b8c9cc0af802b25fee7da0f7620
SHA-256: 80ad721da6222edbafb84dabb070cdda9012e4221302d051d52c2194784e5777
 
IA-32:
gdb-7.0.1-32.el5_6.2.i386.rpm
File outdated by:  RHBA-2012:1248
    MD5: 747c21386e7dc89d1fddfaa3eacc9b1d
SHA-256: 85fb5da696e87e27699c12066e5e410bd814282dc60341de09756661e198beb3
 
IA-64:
gdb-7.0.1-32.el5_6.2.i386.rpm
File outdated by:  RHBA-2012:1248
    MD5: 747c21386e7dc89d1fddfaa3eacc9b1d
SHA-256: 85fb5da696e87e27699c12066e5e410bd814282dc60341de09756661e198beb3
gdb-7.0.1-32.el5_6.2.ia64.rpm
File outdated by:  RHBA-2012:1248
    MD5: d45de832012cccf5c69f73285c177ce7
SHA-256: 94cb31f158cb9a3ab1128e3a5b9369b16ed6c0e67a76e3c9671ba92b05c17a6e
 
x86_64:
gdb-7.0.1-32.el5_6.2.x86_64.rpm
File outdated by:  RHBA-2012:1248
    MD5: 70c395c67129d4b60c8f453930590340
SHA-256: 02162c97ce666032e08d19b81c75738af2e40de45ce6922728df63875eb323b6
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

669636 - [5.6] Using call subcommand to the functions handling DSOs causes info program to behave abnormally



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/