[LWN Logo]
[LWN.net]
From:	 bugzilla@redhat.com
To:	 redhat-watch-list@redhat.com
Subject: [RHBA-2001:159-04] Updated gdb is available
Date:	 Fri, 30 Nov 2001 19:36 -0500

---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Bug Fix Advisory

Synopsis:          Updated gdb is available
Advisory ID:       RHBA-2001:159-04
Issue date:        2001-11-26
Updated on:        2001-11-30
Product:           Red Hat Linux
Keywords:          gdb threads share objects 5.1
Cross references:  
Obsoletes:         
---------------------------------------------------------------------

1. Topic:

Updated GDB packages based on the newly finished 5.1 are made available for
Red Hat Linux 7, 7.1, and 7.2.

2. Relevant releases/architectures:

Red Hat Linux 7.0 - alpha, i386

Red Hat Linux 7.1 - alpha, i386, ia64

Red Hat Linux 7.2 - i386

3. Problem description:

Updated GDB packages based on the newly finished 5.1 are made available for
Red Hat Linux 7, 7.1, and 7.2.

This update should fix various problems, especially in the areas of
dynamically loaded functions and threads.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

23340 - gdb gets segmentation fault when changing preferences
24310 - floating point problems with gcc 2.96 and gdb
26061 - gdb-internal-error: lin-lwp.c:694
30512 - error when thread ends in GDB
39070 - gdb cannot handle more than 32 threads
40612 - gdb thread debugging non-functional
53672 - libdl.so causes gdb to miss breakpoints
54151 - gdb cannot set a breakpoint in function loaded by dlopen and dlsym.

6. RPMs required:

Red Hat Linux 7.0:

SRPMS:
ftp://updates.redhat.com/7.0/en/os/SRPMS/gdb-5.1-0.7.src.rpm

alpha:
ftp://updates.redhat.com/7.0/en/os/alpha/gdb-5.1-0.7.alpha.rpm

i386:
ftp://updates.redhat.com/7.0/en/os/i386/gdb-5.1-0.7.i386.rpm

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/gdb-5.1-0.71.src.rpm

alpha:
ftp://updates.redhat.com/7.1/en/os/alpha/gdb-5.1-0.71.alpha.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/gdb-5.1-0.71.i386.rpm

ia64:
ftp://updates.redhat.com/7.1/en/os/ia64/gdb-5.1-0.71.ia64.rpm

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/gdb-5.1-1.src.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/gdb-5.1-1.i386.rpm



7. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
94cb8db2f1a84b98e7b5448ed5889589 7.0/en/os/SRPMS/gdb-5.1-0.7.src.rpm
90adde7e603a637ed3da6518c18c02df 7.0/en/os/alpha/gdb-5.1-0.7.alpha.rpm
13c57087a9e7853a684761e5bde483b5 7.0/en/os/i386/gdb-5.1-0.7.i386.rpm
35cece715d8968ee123a617ac3b4d2af 7.1/en/os/SRPMS/gdb-5.1-0.71.src.rpm
88588eeb81123c7354455adf2ec72627 7.1/en/os/alpha/gdb-5.1-0.71.alpha.rpm
93e8114013a929824d9126368af5c5e4 7.1/en/os/i386/gdb-5.1-0.71.i386.rpm
50d01f281212644746d2d645030b9426 7.1/en/os/ia64/gdb-5.1-0.71.ia64.rpm
6adb5c96abe82e97bdabb434634500c1 7.2/en/os/SRPMS/gdb-5.1-1.src.rpm
3c0b598d7bd466b31b875f6d867a2ee6 7.2/en/os/i386/gdb-5.1-1.i386.rpm
 

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

8. References:




Copyright(c) 2000, 2001 Red Hat, Inc.



_______________________________________________
Redhat-watch-list mailing list
To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list