Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Patches » RHBA-2013:0029-01


Id RHBA-2013:0029-01
Name Red Hat 2013:0029-01 RHBA gcc bug fix update for RHEL 5 x86
Vendor Name red_hat
Product None
Content Type Recommended Recommended
Operating System(s) Linux 
Released On 07 Jan 2013 12:00:00


Red Hat 2013:0029-01 RHBA gcc bug fix update for RHEL 5 x86

Vendor Name




Released On

07 Jan 2013 12:00:00



The gcc packages provide compilers for C, C++, Java, Fortran, Objective C, and Ada 95 GNU, as well as related support libraries. This update fixes the following bugs: * GCC was missing a lazy declaration of a class type destructor in the locate_dtor function in the method implementation. As a consequence, exception handling did not work as expected under certain circumstances and the generated code could terminate unexpectedly. This update adds the missing destructor declaration and the problem no longer occurs. (BZ#750545) * Previously, GCC did not correctly handle processor registers and used an incorrect memory operand when processing the CMPXCHG8B instruction. As a consequence, the compiler generated erroneous code if the "-fPIC" option was used. This update modifies the underlying source code so that GCC now handles memory operands correctly and compiles position-independent code with the "fPIC" option as expected. (BZ#760417) * GCC previously used incorrect flags for IBM System z specific options, such as "-m31", "-m64", "-mesa", "-mzarch", "-msoft-float", "-mhard-float", "-mlong-double-64" and "-mlong-double-128". As a consequence, when compiling code with any of these options, GCC did not recognize the option and the command failed. With this update, negative flags are now used for these options and code can be compiled successfully in this scenario. (BZ#797938) * GCC did not, under rare circumstances, handle exceptions properly when GCC 4.1 libstdc++ was used with GCC 4.4 or later C++11 code. This update improves exception handling so that GCC now processes exceptions as expected when using GCC 4.4 or later to compile code written in C++11. (BZ#806275) All users of gcc are advised to upgrade to these updated packages, which fix these bugs.

Related Resources

Related Vulnerabilities


Related Patches


Superseded Patches

Last Updated: 27 May 2016 11:16:12