- Issued:
- 2008-07-24
- Updated:
- 2008-07-24
RHBA-2008:0717 - Bug Fix Advisory
Synopsis
gdb bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated gdb package that fixes various bugs is now available.
Description
The GNU debugger, gdb, allows the debugging of programs written in C, C++,
and other languages by executing them in a controlled fashion and then
printing out their data.
This updated package addresses the following issues:
- in certain situations, breakpoints in C++ constructors and destructors
were missed.
- in certain situations, watchpoints were missed after a debugged program
created a new process.
- certain watchpoints were missed during the "step" command.
- decoding the DWARF debugging information failed for certain large amounts
of debug information about application data structures.
- gdb's user interface would sometimes crash when the "focus" command was
called.
- some operations, such as the "info frame" command in particular, were
very slow for applications using libraries with many symbols.
- when using conditional software watchpoints, gdb sometimes crashed when a
variable used for the condition left the current code scope.
- the "gcore" command would generate an invalid core file for applications
with a mapped shared memory segment with shmid 0.
- on PowerPC the "break" command would stop execution later than the first
code instruction. This occured on optimized and position-independent code
(the "-O", "-fPIC", or "-O -fPIE" options) when the appropriate debuginfo
was used.
- on the Itanium (R) architecture, the "gcore" command executed very slowly
and gdb consumed a large amount of memory for debugged programs which used
more than 2GB of memory.
- on the Itanium architecture, a memory leak caused the gdb memory usage to
continually increase whenever the "c" ("continue") command was executed.
The memory was not freed while gdb was being executed.
- on certain unsupported operating systems, gdb would fail to build from
the source RPM due to a missing ".orig" file.
All users of gdb should upgrade to this updated package, which contains
backported patches to resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 338231 - PPC function breakpoint too far behind the prologue
- BZ - 349451 - Watchpoints missed after inferior's fork()
- BZ - 380881 - Leftover .orig file patched by a .src.rpm .patch file
- BZ - 409571 - [4.6][gcore] When the gcore command is executed, it takes a really long time.
- BZ - 439257 - Corrupted DWARF expression
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
gdb-6.3.0.0-1.159.el4.src.rpm | SHA-256: 4b1bbd6fb6dec468b15109e4b269248a318c66eb324068bbf18ab7e6c2693fa6 |
x86_64 | |
gdb-6.3.0.0-1.159.el4.x86_64.rpm | SHA-256: bcdb7faaf642abc5f4523aa9d324a7cbeec1d6df97c9f90cb3f60bc0bf196a3e |
gdb-6.3.0.0-1.159.el4.x86_64.rpm | SHA-256: bcdb7faaf642abc5f4523aa9d324a7cbeec1d6df97c9f90cb3f60bc0bf196a3e |
ia64 | |
gdb-6.3.0.0-1.159.el4.i386.rpm | SHA-256: f900b8e0b790baab0296b02b4da4e060aa1713244d1ed69fb51c390107c5b0f9 |
gdb-6.3.0.0-1.159.el4.i386.rpm | SHA-256: f900b8e0b790baab0296b02b4da4e060aa1713244d1ed69fb51c390107c5b0f9 |
gdb-6.3.0.0-1.159.el4.ia64.rpm | SHA-256: 07af7d03e70c83eac8af0020b2e141702804fd34d795e2062e2b496a3923aa68 |
gdb-6.3.0.0-1.159.el4.ia64.rpm | SHA-256: 07af7d03e70c83eac8af0020b2e141702804fd34d795e2062e2b496a3923aa68 |
i386 | |
gdb-6.3.0.0-1.159.el4.i386.rpm | SHA-256: f900b8e0b790baab0296b02b4da4e060aa1713244d1ed69fb51c390107c5b0f9 |
gdb-6.3.0.0-1.159.el4.i386.rpm | SHA-256: f900b8e0b790baab0296b02b4da4e060aa1713244d1ed69fb51c390107c5b0f9 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
gdb-6.3.0.0-1.159.el4.src.rpm | SHA-256: 4b1bbd6fb6dec468b15109e4b269248a318c66eb324068bbf18ab7e6c2693fa6 |
x86_64 | |
gdb-6.3.0.0-1.159.el4.x86_64.rpm | SHA-256: bcdb7faaf642abc5f4523aa9d324a7cbeec1d6df97c9f90cb3f60bc0bf196a3e |
ia64 | |
gdb-6.3.0.0-1.159.el4.i386.rpm | SHA-256: f900b8e0b790baab0296b02b4da4e060aa1713244d1ed69fb51c390107c5b0f9 |
gdb-6.3.0.0-1.159.el4.ia64.rpm | SHA-256: 07af7d03e70c83eac8af0020b2e141702804fd34d795e2062e2b496a3923aa68 |
i386 | |
gdb-6.3.0.0-1.159.el4.i386.rpm | SHA-256: f900b8e0b790baab0296b02b4da4e060aa1713244d1ed69fb51c390107c5b0f9 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
gdb-6.3.0.0-1.159.el4.src.rpm | SHA-256: 4b1bbd6fb6dec468b15109e4b269248a318c66eb324068bbf18ab7e6c2693fa6 |
x86_64 | |
gdb-6.3.0.0-1.159.el4.x86_64.rpm | SHA-256: bcdb7faaf642abc5f4523aa9d324a7cbeec1d6df97c9f90cb3f60bc0bf196a3e |
i386 | |
gdb-6.3.0.0-1.159.el4.i386.rpm | SHA-256: f900b8e0b790baab0296b02b4da4e060aa1713244d1ed69fb51c390107c5b0f9 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
gdb-6.3.0.0-1.159.el4.src.rpm | SHA-256: 4b1bbd6fb6dec468b15109e4b269248a318c66eb324068bbf18ab7e6c2693fa6 |
s390x | |
gdb-6.3.0.0-1.159.el4.s390x.rpm | SHA-256: e130f0b4e00e2f840edc2e863e1f2816d3f57643af07c32f0318d7b2bcd57eca |
s390 | |
gdb-6.3.0.0-1.159.el4.s390.rpm | SHA-256: 3ef30f9f87336865c5fb84980940e05c88ede81c5f8adf444feeb04deedea114 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
gdb-6.3.0.0-1.159.el4.src.rpm | SHA-256: 4b1bbd6fb6dec468b15109e4b269248a318c66eb324068bbf18ab7e6c2693fa6 |
ppc | |
gdb-6.3.0.0-1.159.el4.ppc64.rpm | SHA-256: ef09f09051eec12ee1a8704382a2bab81a3af609b623ae9ae7d458db4f57f6da |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.