- Issued:
- 2007-11-15
- Updated:
- 2007-11-15
RHBA-2007:0811 - Bug Fix Advisory
Synopsis
gdb bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated gdb package that fixes various bugs is now available.
Description
The GNU debugger, gdb, allows the debugging of programs written in C, C++,
and other languages by executing them in a controlled fashion and then
printing out their data.
This updated package addresses the following issues:
- Fix a possibly lost signal being delivered during a process attachment.
- Support on 64-bit hosts shared libraries debuginfo larger than 2GB.
- Fix GDB hang on the exit of the first thread of a process.
- Fix an unexploitable crash on gcore of a specially-crafted command.
- Fix syscall backtraces after attachment to a process only by its PID.
- Fix backtraces of the callers of functions which would never return.
- Fix a crash on an opaque type dereference.
- Fix a crash on debugging older GCJ (GNU Java) binaries.
- Fix falsely positive disassembling of invalid x86 move instruction opcodes.
- Clean up a stale zombie process during the GDB debugging startup.
- Fix various PowerPC backtrace cases including an unwinding by debuginfo.
- Support stepping over PowerPC atomic instructions (used for threads).
- Fix gcore command for PowerPC 32-bit processes on 64-bit hosts.
- Extend disassembling of the IBM PowerPC Power4 instruction set.
All users of gdb should upgrade to this updated package, which contains
backported patches to resolve these issues.
Known issue:
On PowerPC the command break <function_name> may stop the execution later
than the first code instruction. This occurs on optimized and
position-independent code (-O -fPIC or -O -fPIE), when the appropriate
debuginfo is used.
It is recommended that break *<function_name> be used instead. Note,
however, that while this will allow a stop on the very first code
instruction as expected, the function parameters may still not be properly
displayed at that time.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 140532 - PPC CFI and non-CFI backtraces broken
- BZ - 165025 - GDB intermittently fails with gcj-generated (BC-ABI) .sos.
- BZ - 208476 - bad disassembly for 0xC7 /1 "movl $___,"
- BZ - 221026 - gdb internal error with incomplete type
- BZ - 233746 - pstack can cause process to suspend
- BZ - 243845 - killing gdb debuggee leaves zombie processes
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
gdb-6.3.0.0-1.153.el4.src.rpm | SHA-256: b94d311a607be67f810c1af1027a6224a18044c584e5d61e95b23912eeb6d7e4 |
x86_64 | |
gdb-6.3.0.0-1.153.el4.x86_64.rpm | SHA-256: 5da3ec5013c17fed420812bf0aa7a45971579efa94c63f681841b7bbf9a34edd |
gdb-6.3.0.0-1.153.el4.x86_64.rpm | SHA-256: 5da3ec5013c17fed420812bf0aa7a45971579efa94c63f681841b7bbf9a34edd |
ia64 | |
gdb-6.3.0.0-1.153.el4.i386.rpm | SHA-256: 4e9860c6c5a699d98c4e6094c49ee692e7d4b75aab084d5743e8c0d5ec442cf0 |
gdb-6.3.0.0-1.153.el4.i386.rpm | SHA-256: 4e9860c6c5a699d98c4e6094c49ee692e7d4b75aab084d5743e8c0d5ec442cf0 |
gdb-6.3.0.0-1.153.el4.ia64.rpm | SHA-256: 4a6d7fb0af9a2d69bb0b317a3875799dc41909efd0d8258e569ef6c04f388f6a |
gdb-6.3.0.0-1.153.el4.ia64.rpm | SHA-256: 4a6d7fb0af9a2d69bb0b317a3875799dc41909efd0d8258e569ef6c04f388f6a |
i386 | |
gdb-6.3.0.0-1.153.el4.i386.rpm | SHA-256: 4e9860c6c5a699d98c4e6094c49ee692e7d4b75aab084d5743e8c0d5ec442cf0 |
gdb-6.3.0.0-1.153.el4.i386.rpm | SHA-256: 4e9860c6c5a699d98c4e6094c49ee692e7d4b75aab084d5743e8c0d5ec442cf0 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
gdb-6.3.0.0-1.153.el4.src.rpm | SHA-256: b94d311a607be67f810c1af1027a6224a18044c584e5d61e95b23912eeb6d7e4 |
x86_64 | |
gdb-6.3.0.0-1.153.el4.x86_64.rpm | SHA-256: 5da3ec5013c17fed420812bf0aa7a45971579efa94c63f681841b7bbf9a34edd |
ia64 | |
gdb-6.3.0.0-1.153.el4.i386.rpm | SHA-256: 4e9860c6c5a699d98c4e6094c49ee692e7d4b75aab084d5743e8c0d5ec442cf0 |
gdb-6.3.0.0-1.153.el4.ia64.rpm | SHA-256: 4a6d7fb0af9a2d69bb0b317a3875799dc41909efd0d8258e569ef6c04f388f6a |
i386 | |
gdb-6.3.0.0-1.153.el4.i386.rpm | SHA-256: 4e9860c6c5a699d98c4e6094c49ee692e7d4b75aab084d5743e8c0d5ec442cf0 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
gdb-6.3.0.0-1.153.el4.src.rpm | SHA-256: b94d311a607be67f810c1af1027a6224a18044c584e5d61e95b23912eeb6d7e4 |
x86_64 | |
gdb-6.3.0.0-1.153.el4.x86_64.rpm | SHA-256: 5da3ec5013c17fed420812bf0aa7a45971579efa94c63f681841b7bbf9a34edd |
i386 | |
gdb-6.3.0.0-1.153.el4.i386.rpm | SHA-256: 4e9860c6c5a699d98c4e6094c49ee692e7d4b75aab084d5743e8c0d5ec442cf0 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
gdb-6.3.0.0-1.153.el4.src.rpm | SHA-256: b94d311a607be67f810c1af1027a6224a18044c584e5d61e95b23912eeb6d7e4 |
s390x | |
gdb-6.3.0.0-1.153.el4.s390x.rpm | SHA-256: b64ebbb0c323b738ae222321f9035ccf81bb8fc5cd2723ecb4fe5f82f02c844f |
s390 | |
gdb-6.3.0.0-1.153.el4.s390.rpm | SHA-256: c0422c5dbf8d6647b1c863587ed8df919566c15ed53e9c94c7b58c3a2d6a721d |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
gdb-6.3.0.0-1.153.el4.src.rpm | SHA-256: b94d311a607be67f810c1af1027a6224a18044c584e5d61e95b23912eeb6d7e4 |
ppc | |
gdb-6.3.0.0-1.153.el4.ppc64.rpm | SHA-256: ec06f86594c1d017ff233e96dbf5f5bfaed05a279486c49a8697817aa7f6147b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.