- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2012:0238 - Bug Fix Advisory
Synopsis
gdb bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated gdb package that fixes multiple bugs is now available for Red Hat
Enterprise Linux 5.
Description
The GNU Debugger (GDB) allows users to debug programs written in C, C++, and
other languages by executing them in a controlled fashion and then printing out
their data.
This update fixes the following bugs:
- GDB could stop with an error when trying to access the libpthread shared
library before the library was relocated. With this update, GDB lets the library
relocations be resolved first, allowing GDB to debug programs properly under
these circumstances. (BZ#658851)
- Modifying a string in the executable using the "-write" command line option
could fail with an error if the executable was not running. With this update,
GDB can modify executables even before they are started. (BZ#696148)
- When printing data from a string buffer of constant size, GDB, by default,
also prints the data following after the first zero byte ("\0") of the string.
To display only the data before the zero byte, the "set print null-stop" option
has to be set. Previously with this option set, GDB did not display any string
content due to an incorrect zero byte test condition in the code. The test
condition has been corrected and GDB now properly displays data located before
the first zero byte. (BZ#720717)
- GDB convenience variables allow a user to store and retrieve arbitrary data of
arbitrary data types. Previously, when the GDB convenience variable contained a
structure data type, accessing a field of the structure caused an internal
error. With this update, this problem has been corrected, and GDB now works with
structure convenience variables correctly. (BZ#727726)
- When loading a core dump file for debugging, GDB could incorrectly interpret
inappropriate memory content as the pthread_t identifier if the version of the
glibc library installed on the system did not match the glibc version used to
create the core dump file. Consequently, initialization of the libthread_db
library failed due to an unexpected value of pthread_t, which led to a GDB
internal error. With this update, GDB only displays a warning message and
successfully loads the core file. Instead of the pthread_t identifiers, which
are unavailable in this failure scenario, GDB displays the LWP (light-weight
process) identifiers that match the Linux TID (Thread Identifier) values of the
threads found in the core file. (BZ#748267)
All GDB users are advised to upgrade to this updated package, which fixes these
bugs.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 658851 - _dl_debug_state() RT_CONSISTENT called too early
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
gdb-7.0.1-42.el5.src.rpm | SHA-256: b0868524c3d464b8253f32cf37d941416ab155e9aa230e9fa4f6387a586b4859 |
x86_64 | |
gdb-7.0.1-42.el5.x86_64.rpm | SHA-256: 4dd00daed93d98877955d3bf82d63828f66c2f77e5e06eccaf81939f84468c93 |
ia64 | |
gdb-7.0.1-42.el5.i386.rpm | SHA-256: 5b7de1efd7113c84a74e42adc72706fcc6b48e567945eba8c04df7416e8fc99a |
gdb-7.0.1-42.el5.ia64.rpm | SHA-256: 94d16932583c6213f491efddcfd29e7ad2c9d5da17b442ded685b466ae66a84d |
i386 | |
gdb-7.0.1-42.el5.i386.rpm | SHA-256: 5b7de1efd7113c84a74e42adc72706fcc6b48e567945eba8c04df7416e8fc99a |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
gdb-7.0.1-42.el5.src.rpm | SHA-256: b0868524c3d464b8253f32cf37d941416ab155e9aa230e9fa4f6387a586b4859 |
x86_64 | |
gdb-7.0.1-42.el5.x86_64.rpm | SHA-256: 4dd00daed93d98877955d3bf82d63828f66c2f77e5e06eccaf81939f84468c93 |
i386 | |
gdb-7.0.1-42.el5.i386.rpm | SHA-256: 5b7de1efd7113c84a74e42adc72706fcc6b48e567945eba8c04df7416e8fc99a |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
gdb-7.0.1-42.el5.src.rpm | SHA-256: b0868524c3d464b8253f32cf37d941416ab155e9aa230e9fa4f6387a586b4859 |
x86_64 | |
gdb-7.0.1-42.el5.x86_64.rpm | SHA-256: 4dd00daed93d98877955d3bf82d63828f66c2f77e5e06eccaf81939f84468c93 |
i386 | |
gdb-7.0.1-42.el5.i386.rpm | SHA-256: 5b7de1efd7113c84a74e42adc72706fcc6b48e567945eba8c04df7416e8fc99a |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
gdb-7.0.1-42.el5.src.rpm | SHA-256: b0868524c3d464b8253f32cf37d941416ab155e9aa230e9fa4f6387a586b4859 |
s390x | |
gdb-7.0.1-42.el5.s390x.rpm | SHA-256: a907fa3372673660f8fcbd2f7d95848db5740f86188e4145459173780f4d1bbd |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
gdb-7.0.1-42.el5.src.rpm | SHA-256: b0868524c3d464b8253f32cf37d941416ab155e9aa230e9fa4f6387a586b4859 |
ppc | |
gdb-7.0.1-42.el5.ppc64.rpm | SHA-256: 00f8a2ce8d9156d9a45ed5ec8c48bb4a725aff9e39931e0f83d0642b335877de |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
gdb-7.0.1-42.el5.src.rpm | SHA-256: b0868524c3d464b8253f32cf37d941416ab155e9aa230e9fa4f6387a586b4859 |
x86_64 | |
gdb-7.0.1-42.el5.x86_64.rpm | SHA-256: 4dd00daed93d98877955d3bf82d63828f66c2f77e5e06eccaf81939f84468c93 |
i386 | |
gdb-7.0.1-42.el5.i386.rpm | SHA-256: 5b7de1efd7113c84a74e42adc72706fcc6b48e567945eba8c04df7416e8fc99a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.