Skip to navigation

Bug Fix Advisory strace bug fix and enhancement update

Advisory: RHBA-2012:1317-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-10-01
Last updated on: 2012-10-01
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated strace packages that fix a bug are now available for Red Hat Enterprise
Linux 6.

The strace packages provide an utility to intercept and record the system calls
called and received by a running process. The strace utility can print a record
of each system call, its arguments, and its return value. The strace utility is
useful for diagnosing, debugging, and instructional purposes.

This update fixes the following bug:

* Previously, the strace utility used magic breakpoints in the process startup
code to detect and control process startup. Consequently, under certain
circumstances, the %ebx register could be corrupted around the clone syscall
within the libc_fork() function, which could cause an application to terminate
unexpectedly with a segmentation fault while under strace control. This update
changes strace to use the TRACE{FORK,VFORK,CLONE} ptrace capabilities which
provide a cleaner, less error-prone interface to monitor and control process
startup when tracing, thus preventing this bug. (BZ#849052)

All users of strace are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
strace-4.5.19-1.11.el6_3.2.src.rpm
File outdated by:  RHBA-2013:0282
    MD5: e335cf323593a77d21d6ead2e2cb9551
SHA-256: 47be32d3caf018b2a8439004c2a5248949f6707f92ed778b0d93553a98c7b325
 
IA-32:
strace-4.5.19-1.11.el6_3.2.i686.rpm
File outdated by:  RHBA-2013:0282
    MD5: c6cfbeb8493506d620e11034d06fd6f8
SHA-256: 341c5fa3297dcbe3d427a9ab791960b03a74f52e903f45526087e3552ead8f4d
strace-debuginfo-4.5.19-1.11.el6_3.2.i686.rpm
File outdated by:  RHBA-2013:0282
    MD5: c71f3c658313dc0fd34e96225b8a314c
SHA-256: 3039e3bfa9e9bb27f02068278e622b50dbd82bfa41390dd77a610ca76796b255
 
x86_64:
strace-4.5.19-1.11.el6_3.2.x86_64.rpm
File outdated by:  RHBA-2013:0282
    MD5: c7456ba5f5e34cec46ed288b6b5d93be
SHA-256: a6c919a3da077b79d15eba3b09dab02b239e78babaa9ab6534527e0e837b6aca
strace-debuginfo-4.5.19-1.11.el6_3.2.x86_64.rpm
File outdated by:  RHBA-2013:0282
    MD5: d7e61ece936456e36b9048691081ea86
SHA-256: 56b6f0cf68c6e06c3dbe68aebc47506a3716b2f0aac9e402f1e27feacab4dd3e
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
strace-4.5.19-1.11.el6_3.2.src.rpm
File outdated by:  RHBA-2013:0282
    MD5: e335cf323593a77d21d6ead2e2cb9551
SHA-256: 47be32d3caf018b2a8439004c2a5248949f6707f92ed778b0d93553a98c7b325
 
x86_64:
strace-4.5.19-1.11.el6_3.2.x86_64.rpm
File outdated by:  RHBA-2013:0282
    MD5: c7456ba5f5e34cec46ed288b6b5d93be
SHA-256: a6c919a3da077b79d15eba3b09dab02b239e78babaa9ab6534527e0e837b6aca
strace-debuginfo-4.5.19-1.11.el6_3.2.x86_64.rpm
File outdated by:  RHBA-2013:0282
    MD5: d7e61ece936456e36b9048691081ea86
SHA-256: 56b6f0cf68c6e06c3dbe68aebc47506a3716b2f0aac9e402f1e27feacab4dd3e
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
strace-4.5.19-1.11.el6_3.2.src.rpm
File outdated by:  RHBA-2013:0282
    MD5: e335cf323593a77d21d6ead2e2cb9551
SHA-256: 47be32d3caf018b2a8439004c2a5248949f6707f92ed778b0d93553a98c7b325
 
IA-32:
strace-4.5.19-1.11.el6_3.2.i686.rpm
File outdated by:  RHBA-2013:0282
    MD5: c6cfbeb8493506d620e11034d06fd6f8
SHA-256: 341c5fa3297dcbe3d427a9ab791960b03a74f52e903f45526087e3552ead8f4d
strace-debuginfo-4.5.19-1.11.el6_3.2.i686.rpm
File outdated by:  RHBA-2013:0282
    MD5: c71f3c658313dc0fd34e96225b8a314c
SHA-256: 3039e3bfa9e9bb27f02068278e622b50dbd82bfa41390dd77a610ca76796b255
 
PPC:
strace-4.5.19-1.11.el6_3.2.ppc64.rpm
File outdated by:  RHBA-2013:0282
    MD5: 9ecdaabca29234af50a3d0f8bb8d09e7
SHA-256: 08c2d235a13103dac1d7df0845b4c01291648fdf6f749411269b9f1230c9fac5
strace-debuginfo-4.5.19-1.11.el6_3.2.ppc64.rpm
File outdated by:  RHBA-2013:0282
    MD5: 3b0443e1e1611f947782f8b8b8c7d3b2
SHA-256: 880f6b171edf86bff2f94280bb53bf08ca91c981e70b567a8e277b414ea1ef2e
strace64-4.5.19-1.11.el6_3.2.ppc64.rpm     MD5: 50f340fcf8aaadd3edd27650bd7af235
SHA-256: 78ba4df8664338afd2395175695646bfcc94bafba6a37d9124487b0e0c067e94
 
s390x:
strace-4.5.19-1.11.el6_3.2.s390x.rpm
File outdated by:  RHBA-2013:0282
    MD5: efbf6aca729939b524ef928ae1222dc2
SHA-256: f49189e38a059486dfd1bcaca9c53454c1152de7e917d841f2f35dd9cc9ce721
strace-debuginfo-4.5.19-1.11.el6_3.2.s390x.rpm
File outdated by:  RHBA-2013:0282
    MD5: 2069ae1b1e6fa24f26df0e880deb2952
SHA-256: ee11c288b1b788381a57bcc4077ccf53328c07a88d9724bad86dd300be802c76
 
x86_64:
strace-4.5.19-1.11.el6_3.2.x86_64.rpm
File outdated by:  RHBA-2013:0282
    MD5: c7456ba5f5e34cec46ed288b6b5d93be
SHA-256: a6c919a3da077b79d15eba3b09dab02b239e78babaa9ab6534527e0e837b6aca
strace-debuginfo-4.5.19-1.11.el6_3.2.x86_64.rpm
File outdated by:  RHBA-2013:0282
    MD5: d7e61ece936456e36b9048691081ea86
SHA-256: 56b6f0cf68c6e06c3dbe68aebc47506a3716b2f0aac9e402f1e27feacab4dd3e
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
strace-4.5.19-1.11.el6_3.2.src.rpm
File outdated by:  RHBA-2013:0282
    MD5: e335cf323593a77d21d6ead2e2cb9551
SHA-256: 47be32d3caf018b2a8439004c2a5248949f6707f92ed778b0d93553a98c7b325
 
IA-32:
strace-4.5.19-1.11.el6_3.2.i686.rpm     MD5: c6cfbeb8493506d620e11034d06fd6f8
SHA-256: 341c5fa3297dcbe3d427a9ab791960b03a74f52e903f45526087e3552ead8f4d
strace-debuginfo-4.5.19-1.11.el6_3.2.i686.rpm     MD5: c71f3c658313dc0fd34e96225b8a314c
SHA-256: 3039e3bfa9e9bb27f02068278e622b50dbd82bfa41390dd77a610ca76796b255
 
PPC:
strace-4.5.19-1.11.el6_3.2.ppc64.rpm     MD5: 9ecdaabca29234af50a3d0f8bb8d09e7
SHA-256: 08c2d235a13103dac1d7df0845b4c01291648fdf6f749411269b9f1230c9fac5
strace-debuginfo-4.5.19-1.11.el6_3.2.ppc64.rpm     MD5: 3b0443e1e1611f947782f8b8b8c7d3b2
SHA-256: 880f6b171edf86bff2f94280bb53bf08ca91c981e70b567a8e277b414ea1ef2e
strace64-4.5.19-1.11.el6_3.2.ppc64.rpm     MD5: 50f340fcf8aaadd3edd27650bd7af235
SHA-256: 78ba4df8664338afd2395175695646bfcc94bafba6a37d9124487b0e0c067e94
 
s390x:
strace-4.5.19-1.11.el6_3.2.s390x.rpm     MD5: efbf6aca729939b524ef928ae1222dc2
SHA-256: f49189e38a059486dfd1bcaca9c53454c1152de7e917d841f2f35dd9cc9ce721
strace-debuginfo-4.5.19-1.11.el6_3.2.s390x.rpm     MD5: 2069ae1b1e6fa24f26df0e880deb2952
SHA-256: ee11c288b1b788381a57bcc4077ccf53328c07a88d9724bad86dd300be802c76
 
x86_64:
strace-4.5.19-1.11.el6_3.2.x86_64.rpm     MD5: c7456ba5f5e34cec46ed288b6b5d93be
SHA-256: a6c919a3da077b79d15eba3b09dab02b239e78babaa9ab6534527e0e837b6aca
strace-debuginfo-4.5.19-1.11.el6_3.2.x86_64.rpm     MD5: d7e61ece936456e36b9048691081ea86
SHA-256: 56b6f0cf68c6e06c3dbe68aebc47506a3716b2f0aac9e402f1e27feacab4dd3e
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
strace-4.5.19-1.11.el6_3.2.src.rpm
File outdated by:  RHBA-2013:0282
    MD5: e335cf323593a77d21d6ead2e2cb9551
SHA-256: 47be32d3caf018b2a8439004c2a5248949f6707f92ed778b0d93553a98c7b325
 
IA-32:
strace-4.5.19-1.11.el6_3.2.i686.rpm
File outdated by:  RHBA-2013:0282
    MD5: c6cfbeb8493506d620e11034d06fd6f8
SHA-256: 341c5fa3297dcbe3d427a9ab791960b03a74f52e903f45526087e3552ead8f4d
strace-debuginfo-4.5.19-1.11.el6_3.2.i686.rpm
File outdated by:  RHBA-2013:0282
    MD5: c71f3c658313dc0fd34e96225b8a314c
SHA-256: 3039e3bfa9e9bb27f02068278e622b50dbd82bfa41390dd77a610ca76796b255
 
x86_64:
strace-4.5.19-1.11.el6_3.2.x86_64.rpm
File outdated by:  RHBA-2013:0282
    MD5: c7456ba5f5e34cec46ed288b6b5d93be
SHA-256: a6c919a3da077b79d15eba3b09dab02b239e78babaa9ab6534527e0e837b6aca
strace-debuginfo-4.5.19-1.11.el6_3.2.x86_64.rpm
File outdated by:  RHBA-2013:0282
    MD5: d7e61ece936456e36b9048691081ea86
SHA-256: 56b6f0cf68c6e06c3dbe68aebc47506a3716b2f0aac9e402f1e27feacab4dd3e
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/