Updated GDB packages that fix one bug are now available for Red Hat EnterpriseLinux 6.

The GNU Debugger (GDB) allows debugging of programs written in C, C++, Java, andother languages by executing them in a controlled fashion and then printing outtheir data.This update fixes the following bug:* In some specific situations, when users tried to debug certain coredump filesgenerated from multithreaded applications, GDB terminated unexpectedly whenrequired to display a backtrace of all threads. A patch has been provided to fixthis bug. Now, GDB no longer crashes, and users can obtain the full backtracefor all threads. (BZ#1108489)Users of gdb are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously-released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/knowledge/articles/11258Red Hat Enterprise Linux Server AUS (v. 6.4)

SRPMS:
gdb-7.2-60.el6_4.4.src.rpm
    MD5: 60f44005e11cd2d201f41ae8244db5a9SHA-256: 3ca36f9fdc585e6652b46a987f285ce38a4ea0c24b2b21726ab389d6e4be45fe
 
x86_64:
gdb-7.2-60.el6_4.4.x86_64.rpm
    MD5: d960e61e87b77ebb631e715c58eba75bSHA-256: fa063fe40d02b57222b4b0bb0aff24bb6fd2ebfa6c23357d0a32d876dbe040e6
gdb-debuginfo-7.2-60.el6_4.4.x86_64.rpm
    MD5: fe42c7e27791d9f83ecfbe5c4809cbe7SHA-256: a3033c4e1e53c3eb63d47d0367a77ee3372cdecc7251b93009c7dc02f3e70a2b
gdb-gdbserver-7.2-60.el6_4.4.x86_64.rpm
    MD5: cf66971ee57616789adb40e06aa45078SHA-256: f9297a04577d5cea0dd7714948ef953b0bed1c6fdc0dde3a39ed3242251b425c
 
Red Hat Enterprise Linux Server EUS (v. 6.4.z)

SRPMS:
gdb-7.2-60.el6_4.4.src.rpm
    MD5: 60f44005e11cd2d201f41ae8244db5a9SHA-256: 3ca36f9fdc585e6652b46a987f285ce38a4ea0c24b2b21726ab389d6e4be45fe
 
IA-32:
gdb-7.2-60.el6_4.4.i686.rpm
    MD5: 4dc470a5b34f7788dd21f08835f7fddbSHA-256: 3a1fc964fae17e22180e85cce7b0381b8c3757ba3ab05a8d754928e654b9acc6
gdb-debuginfo-7.2-60.el6_4.4.i686.rpm
    MD5: a7d301812da19e15e8482a768ee39c3cSHA-256: ac326e55c8e44d8efee2c297e15b7254b50fd2e16164f584da510e759438adbb
gdb-gdbserver-7.2-60.el6_4.4.i686.rpm
    MD5: 481bc3a8f1243714714204253c942e5bSHA-256: 74fbc6692c4fe69910ea7cf41e0917eee8e85104d873a7c44f36fac552d24b64
 
PPC:
gdb-7.2-60.el6_4.4.ppc64.rpm
    MD5: 7e188f75c7cede462a4e26a37d60876eSHA-256: c954a8f280386916127c2cd371a363cd97c6f9c565cd3c8068d33090f15c1cbb
gdb-debuginfo-7.2-60.el6_4.4.ppc64.rpm
    MD5: 34c11145909d17db64f8367a4e8d1516SHA-256: b08b9bac3a82f300668b0aef625eecf52ba11eeeb278bd60b7daccd0fe726d44
gdb-gdbserver-7.2-60.el6_4.4.ppc64.rpm
    MD5: 6092c94cb1e694ea16948d1da201f7a4SHA-256: 669d8acfb35b9bf47b1b8a1ffae9eec4d661a9fb59e76d439c76cd144283c1e4
 
s390x:
gdb-7.2-60.el6_4.4.s390x.rpm
    MD5: a65d5e6bc3a9f3f473be853426a0ee4dSHA-256: 66315078e0795cb1d898dde2ae683ea002ef620fc3b2f4c578616eab4515d9cc
gdb-debuginfo-7.2-60.el6_4.4.s390x.rpm
    MD5: 6fcf168266d3fb58f116be7d83df0853SHA-256: ec73e6f08e6c238e55b16420518deb02ecb4cd57563a49ee149134d44e23971e
gdb-gdbserver-7.2-60.el6_4.4.s390x.rpm
    MD5: 7a5e71ab31df3341ff354b380e4aec10SHA-256: de83e107ecb896db25cb3c92975d2f612a5a489587d414db847c4045ae84dc53
 
x86_64:
gdb-7.2-60.el6_4.4.x86_64.rpm
    MD5: d960e61e87b77ebb631e715c58eba75bSHA-256: fa063fe40d02b57222b4b0bb0aff24bb6fd2ebfa6c23357d0a32d876dbe040e6
gdb-debuginfo-7.2-60.el6_4.4.x86_64.rpm
    MD5: fe42c7e27791d9f83ecfbe5c4809cbe7SHA-256: a3033c4e1e53c3eb63d47d0367a77ee3372cdecc7251b93009c7dc02f3e70a2b
gdb-gdbserver-7.2-60.el6_4.4.x86_64.rpm
    MD5: cf66971ee57616789adb40e06aa45078SHA-256: f9297a04577d5cea0dd7714948ef953b0bed1c6fdc0dde3a39ed3242251b425c
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply