4.38. gdb
Updated gdb packages that fix a bug are now available for Red Hat Enterprise Linux 5.
The GNU Debugger (GDB) allows debugging of programs written in C, C++, Java, and other languages by executing them in a controlled fashion and then printing out their data.
Bug Fix
- BZ#837894
- When a struct member was at an offset greater than 256 MB, the resulting bit position within the struct overflowed and caused an invalid access by GDB. With this update, the code has been modified to ensure that GDB can access such positions.
All users of gdb are advised to upgrade to these updated packages, which fix this bug.
Updated gdb packages that fix three bugs are now available for Red Hat Enterprise Linux 5.
The gdb packages provide the GNU Debugger (GDB) to debug programs written in C, C++, Java, and other languages by executing them in a controlled fashion and then printing out their data.
Bug Fixes
- BZ#795423
- Prior to this update, a bit position within a structure overflowed when a member of this structure was at an offset greater than 256 MB and GDB failed to access the position. This update modifies the underlying code to ensure that GDB can access such positions.
- BZ#818343
- Prior to this update, GDB incorrectly tried to load virtual dynamic shared objects (vDSO) from the file system when using the "solib-absolute-prefix" command. As a consequence, vDSOs could abort. This update modifies the underlying code to handle vDSOs as expected.
- BZ#823789
- Prior to this update, GDB failed to debug XLF generated code due to incorrect symbol handling. As a consequence, the type of variable in modules was not found. This update modifies the underlying code to handle symbols correctly and the type of a variable is found.
All users of gdb are advised to upgrade to these updated packages, which fix these bugs.