- Issued:
- 2008-05-21
- Updated:
- 2008-05-21
RHBA-2008:0444 - Bug Fix Advisory
Synopsis
booty bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated booty package that fixes a bug is now available.
Description
The booty package contains a Python library, that provides an interface
for the creation of boot loader configuration files, and the addition of
stanzas to such configuration files. These boot loader configuration files
are used by the Anaconda installer.
When using DMRAID devices, selecting to install the boot record on the
first partition of a RAID device, always resulted in the boot record being
written to the MBR.
Users of booty are advised to upgrade to this updated package, which
resolves this issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 236452 - bootrecord always written to MBR, when device is using the 'disk#p#' partition naming scheme
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
booty-0.80.4-6.src.rpm | SHA-256: 4f1bf20949e1660b4824d5fa8767263a6c8a5f7f35da92ce9d3ecaa36d88e03e |
x86_64 | |
booty-0.80.4-6.noarch.rpm | SHA-256: 97b5befddfb296445540666e8448858805439a9c287c2c7b497e610ebf5fbd62 |
ia64 | |
booty-0.80.4-6.noarch.rpm | SHA-256: 97b5befddfb296445540666e8448858805439a9c287c2c7b497e610ebf5fbd62 |
i386 | |
booty-0.80.4-6.noarch.rpm | SHA-256: 97b5befddfb296445540666e8448858805439a9c287c2c7b497e610ebf5fbd62 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
booty-0.80.4-6.src.rpm | SHA-256: 4f1bf20949e1660b4824d5fa8767263a6c8a5f7f35da92ce9d3ecaa36d88e03e |
x86_64 | |
booty-0.80.4-6.noarch.rpm | SHA-256: 97b5befddfb296445540666e8448858805439a9c287c2c7b497e610ebf5fbd62 |
i386 | |
booty-0.80.4-6.noarch.rpm | SHA-256: 97b5befddfb296445540666e8448858805439a9c287c2c7b497e610ebf5fbd62 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
booty-0.80.4-6.src.rpm | SHA-256: 4f1bf20949e1660b4824d5fa8767263a6c8a5f7f35da92ce9d3ecaa36d88e03e |
x86_64 | |
booty-0.80.4-6.noarch.rpm | SHA-256: 97b5befddfb296445540666e8448858805439a9c287c2c7b497e610ebf5fbd62 |
i386 | |
booty-0.80.4-6.noarch.rpm | SHA-256: 97b5befddfb296445540666e8448858805439a9c287c2c7b497e610ebf5fbd62 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
booty-0.80.4-6.src.rpm | SHA-256: 4f1bf20949e1660b4824d5fa8767263a6c8a5f7f35da92ce9d3ecaa36d88e03e |
s390x | |
booty-0.80.4-6.noarch.rpm | SHA-256: 97b5befddfb296445540666e8448858805439a9c287c2c7b497e610ebf5fbd62 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
booty-0.80.4-6.src.rpm | SHA-256: 4f1bf20949e1660b4824d5fa8767263a6c8a5f7f35da92ce9d3ecaa36d88e03e |
ppc | |
booty-0.80.4-6.noarch.rpm | SHA-256: 97b5befddfb296445540666e8448858805439a9c287c2c7b497e610ebf5fbd62 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
booty-0.80.4-6.src.rpm | SHA-256: 4f1bf20949e1660b4824d5fa8767263a6c8a5f7f35da92ce9d3ecaa36d88e03e |
x86_64 | |
booty-0.80.4-6.noarch.rpm | SHA-256: 97b5befddfb296445540666e8448858805439a9c287c2c7b497e610ebf5fbd62 |
i386 | |
booty-0.80.4-6.noarch.rpm | SHA-256: 97b5befddfb296445540666e8448858805439a9c287c2c7b497e610ebf5fbd62 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.