Chapter 1. Package Updates
66
* GDB no longer obsoletes the pstack package. (
BZ#550786
413
)
* Loading symbols in STABS debug format could crash GDB. The STABS format is no longer
supported, as Red Hat Enterprise Linux uses the debug format DWARF. With this update, loading
symbols in STABS format no longer crashes GDB; instead, such symbols are simply loaded
incorrectly. (
BZ#553672
414
)
* Adding GDB support for Fortran modules in previous releases introduced a regression which
prevented GDB from setting breakpoints on a Fortran program's name. This was caused by a bug in
the search routines used when "set language fortran" is enabled. This update fixes the regression.
(
BZ#559291
415
)
* The Red Hat Enterprise Linux 5.5 version of GDB also contains a fix for an upstream GDB
regression that prevented users from setting rwatch and awatch breakpoints before a program
starts. This version of GDB implements a compatibility fix from GDB 6.8 to address the regression.
(
BZ#562770
416
)
* A "break-by-name on inlined functions" feature introduced in Fedora GDB made it possible for
parameters of inlined functions to be incorrectly hidden. Whenever this occurred during debugging,
GDB printed "<optimized out>" in backtraces or upon entering such functions. In some cases, stepping
through inlined functions could also abort GDB with an internal error. This release resolves the issue
by removing the "break-by-name on inlined functions" feature altogether. (
BZ#565601
417
)
All GDB users should apply this update.
1.61. gfs-kmod
1.61.1. RHSA-2010:0291: Moderate security, bug fix and
enhancement update
Updated gfs-kmod packages that fix one security issue, numerous bugs, and add one enhancement
are now available for Red Hat Enterprise Linux 5.5, kernel release 2.6.18-194.el5.
The Red Hat Security Response Team has rated this update as having moderate security impact. A
Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is
available from the CVE link in the References section.
The gfs-kmod packages contain modules that provide the ability to mount and use GFS file systems.
A flaw was found in the gfs_lock() implementation. The GFS locking code could skip the lock operation
for files that have the S_ISGID bit (set-group-ID on execution) in their mode set. A local, unprivileged
user on a system that has a GFS file system mounted could use this flaw to cause a kernel panic.
(
CVE-2010-0727
418
)
These updated gfs-kmod packages are in sync with the latest kernel (2.6.18-194.el5). The modules
in earlier gfs-kmod packages failed to load because they did not match the running kernel. It was
possible to force-load the modules. With this update, however, users no longer need to.
413
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=550786
414
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=553672
415
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=559291
416
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=562770
417
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=565601
418
https://www.redhat.com/security/data/cve/CVE-2010-0727.html
Содержание ENTERPRISE LINUX 5.5 - S 2010
Страница 10: ...x ...
Страница 308: ...298 ...
Страница 310: ...300 ...
Страница 468: ...458 ...
Страница 470: ...460 ...