Skip to navigation

Bug Fix Advisory gdb bug fix update

Advisory: RHBA-2013:0044-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated gdb packages that fix three bugs are now available for Red Hat
Enterprise Linux 5.

The gdb packages provide the GNU Debugger (GDB) to debug programs written in C,
C++, Java, and other languages by executing them in a controlled fashion and
then printing out their data.

This update fixes the following bugs:

* Prior to this update, a bit position within a structure overflowed when a
member of this structure was at an offset greater than 256 MB and GDB failed to
access the position. This update modifies the underlying code to ensure that GDB
can access such positions. (BZ#795423)

* Prior to this update, GDB incorrectly tried to load virtual dynamic shared
objects (vDSO) from the file system when using the "solib-absolute-prefix"
command. As a consequence, vDSOs could abort. This update modifies the
underlying code to handle vDSOs as expected. (BZ#818343)

* Prior to this update, GDB failed to debug XLF generated code due to incorrect
symbol handling. As a consequence, the type of variable in modules was not
found. This update modifies the underlying code to handle symbols correctly and
the type of a variable is found. (BZ#823789)

All users of gdb are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
gdb-7.0.1-45.el5.src.rpm     MD5: 03b4b760f4371d81b410fa438659c8b1
SHA-256: bdb87731e908769a6bfe7c688c21f4a2c9b9668ae9b4605dba69243ff0014a1f
 
IA-32:
gdb-7.0.1-45.el5.i386.rpm     MD5: 4d00d839c258f0c98e4e288c1262820a
SHA-256: 50a4f0731386b852a6d53bf1d504494b25bf91ad0e8cf69b730db0c28c6315bc
gdb-debuginfo-7.0.1-45.el5.i386.rpm     MD5: 1728ffd9d3667145dc7c4e04d5c4e4e6
SHA-256: b87e5c4a6c075ca8bd370d4daa738454a8f505bc8bd4026ebd2c4eabdaf23943
 
IA-64:
gdb-7.0.1-45.el5.i386.rpm     MD5: 4d00d839c258f0c98e4e288c1262820a
SHA-256: 50a4f0731386b852a6d53bf1d504494b25bf91ad0e8cf69b730db0c28c6315bc
gdb-7.0.1-45.el5.ia64.rpm     MD5: 5c8ee67685cacc55d72a2c727553b395
SHA-256: de5587ba0725e4ac26dab3702d56ec42286f0c90fa47ceac5a9610d1e000d1e7
gdb-debuginfo-7.0.1-45.el5.i386.rpm     MD5: 1728ffd9d3667145dc7c4e04d5c4e4e6
SHA-256: b87e5c4a6c075ca8bd370d4daa738454a8f505bc8bd4026ebd2c4eabdaf23943
gdb-debuginfo-7.0.1-45.el5.ia64.rpm     MD5: c1c19ebb1d388137eccd611f51b7b51d
SHA-256: 1962c8e9ce43deaec5c1b6a760f6b6738940d81366da6026209f44d2d4c16074
 
PPC:
gdb-7.0.1-45.el5.ppc64.rpm     MD5: a13a47bf32a6bf0e1123029c7d96e7ff
SHA-256: 18244a1e5349ec3f2c1fa5db94d37dd49803721138f4bcc1648327cb8799a45d
gdb-debuginfo-7.0.1-45.el5.ppc64.rpm     MD5: d3625a109bfe64f1d7fd9b6670bd3187
SHA-256: 540d89596ac118a86545c2189b896a9cb2f16d7f9ca94919436ad695c052e91a
 
s390x:
gdb-7.0.1-45.el5.s390x.rpm     MD5: 7e2aa941c3a2c34620f20e37b44e7cd5
SHA-256: c5f4bf16d5bd93c39fd848ca92931edeaebac65ea0768e25827aaba13dd8f5e0
gdb-debuginfo-7.0.1-45.el5.s390x.rpm     MD5: 42151f46d9f1731dbef25478b2d86aa7
SHA-256: ac9fced77c38f09dea2e03d31d018b2c5e2d5942ec68e837bb36f337db5fa480
 
x86_64:
gdb-7.0.1-45.el5.x86_64.rpm     MD5: 6ec7c1b17dbbdc0f27b2bda9955207eb
SHA-256: 683c38c43a97abf83b36e3ee1b0119147dd3794323314066056f9cc7afaf8f77
gdb-debuginfo-7.0.1-45.el5.x86_64.rpm     MD5: 5a3b5d8489bb1b0ec169d11c76305fe4
SHA-256: e647f2be96c25b49bdec996e87e8b4e295d5e641afcfcb83bc535e55def59223
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
gdb-7.0.1-45.el5.src.rpm     MD5: 03b4b760f4371d81b410fa438659c8b1
SHA-256: bdb87731e908769a6bfe7c688c21f4a2c9b9668ae9b4605dba69243ff0014a1f
 
IA-32:
gdb-7.0.1-45.el5.i386.rpm     MD5: 4d00d839c258f0c98e4e288c1262820a
SHA-256: 50a4f0731386b852a6d53bf1d504494b25bf91ad0e8cf69b730db0c28c6315bc
gdb-debuginfo-7.0.1-45.el5.i386.rpm     MD5: 1728ffd9d3667145dc7c4e04d5c4e4e6
SHA-256: b87e5c4a6c075ca8bd370d4daa738454a8f505bc8bd4026ebd2c4eabdaf23943
 
x86_64:
gdb-7.0.1-45.el5.x86_64.rpm     MD5: 6ec7c1b17dbbdc0f27b2bda9955207eb
SHA-256: 683c38c43a97abf83b36e3ee1b0119147dd3794323314066056f9cc7afaf8f77
gdb-debuginfo-7.0.1-45.el5.x86_64.rpm     MD5: 5a3b5d8489bb1b0ec169d11c76305fe4
SHA-256: e647f2be96c25b49bdec996e87e8b4e295d5e641afcfcb83bc535e55def59223
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/