gdb
65
A missing input sanitization flaw, leading to a buffer overflow, was discovered in the gd library. A
specially-crafted GD image file could cause an application using the gd library to crash or, possibly,
execute arbitrary code when opened. (
CVE-2009-3546
407
)
Users of gd should upgrade to these updated packages, which contain a backported patch to resolve
this issue.
1.60. gdb
1.60.1. RHBA-2010:0285: bug fix update
An updated gdb package that fixes various bugs is now available.
The GNU Project debugger, GDB, debugs programs written in C, C++, and other languages by
executing them in a controlled fashion, and then printing out their data.
With this update, GDB is now re-based to upstream version 7.0.1 (
BZ#526533
408
). This applies
several bug fixes and enhancements not listed here. For a full description of this version, refer to
the following link: http://sourceware.org/cgi-bin/cvsweb.cgi/src/gdb/NEWS.diff?cvsroot=src&r1=t
ext&tr1=1.259.2.1&r2=text&tr2=1.331.2.2&f=u
This update applies the following bug fixes:
* Printing values from a debugged program by dereferencing a pointer to an object of dynamic type
printed out an error stating "Cannot resolve DW_OP_push_object_address for a missing object". Such
pointers are produced by an unsupported iFort compiler, not by gfortran. With this update, GDB can
now dereference pointers to objects of dynamic type, thereby correctly printing the dynamic Fortran
arrays dereferenced from such pointers (as produced by the iFort compiler). (
BZ#514287
409
)
* Debugging a program with thousands of set breakpoints was unacceptably slow. This was
because a previous patch introduced a mechanism that hid breakpoint instructions and returned
"shadow" content whenever target_read_memory() accessed memory. The aforementioned patch
was implemented upstream to be used with a "breakpoint always-inserted" option, which was not
implemented in Red Hat Enterprise Linux version of GDB. But Red Hat Enterprise Linux version
backported it to solve a problem on Itanium where instruction (and thus even breakpoint instruction)
boundaries are not byte-aligned. This update reimplements the shadowing functionality using more
optimal log(n) algorithm instead, which consequently prevents any unnecessary slowdown when
processing programs with numerous set breakpoints. (
BZ#520618
410
)
* GDB incorrectly skipped OpenMP parallel sections (instead of entering them as expected) when
using the "next" command. This was caused by missing DWARF annotations from GCC that made
it possible for OpenMP parallel sections to be incorrectly classified as function calls. To address this,
GDB contains special instructions to make OpenMP parallel sections indifferent to normal code,
allowing GDB to step into parallel sections with "next" correctly. (
BZ#533176
411
)
* The GDB version banner now correctly displays "Red Hat Enterprise Linux" instead of "Fedora".
(
BZ#537788
412
)
407
https://www.redhat.com/security/data/cve/CVE-2009-3546.html
408
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=526533
409
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=514287
410
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=520618
411
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=533176
412
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=537788
Summary of Contents for ENTERPRISE LINUX 5.5 - S 2010
Page 10: ...x ...
Page 308: ...298 ...
Page 310: ...300 ...
Page 468: ...458 ...
Page 470: ...460 ...