- Issued:
- 2011-04-05
- Updated:
- 2011-04-05
RHBA-2011:0415 - Bug Fix Advisory
Synopsis
gpxe bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated gpxe packages that fix one bug are now available for Red Hat Enterprise
Linux 6.
Description
The gpxe packages provide an open source Preboot Execution Environment (PXE)
implementation and bootloader. gPXE also supports additional protocols such as
DNS, HTTP, iSCSI and ATA over Ethernet.
This update fixes the following bug:
- Previously, the virtIO gPXE driver padded all packets to maximum length. This
could confuse some gateways because the Ethernet standard is to pad only packets
of up to 64 bytes in length. Due to this issue, virtual machines with a virtIO
NIC (network interface card) failed to connect to the PXE server behind a
gateway. Subsequently, the PXE boot failed. This update pads only packets of up
to 64 bytes in length. Now, virtual machines with a virtIO NIC connect to the
same PXE server without further problems. (BZ#680148)
All gPXE users are advised to upgrade to these updated packages which fix this
bug.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
gpxe-0.9.7-6.3.el6_0.1.src.rpm | SHA-256: adf8c602d8244ba0126d058051328e7fa65eaf134ced982aabc8456d890dfa45 |
x86_64 | |
gpxe-bootimgs-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: c86bd12f777b0de488d424e6f18251b41c57893fb0c3a6fcafad6052e2f7ef29 |
gpxe-bootimgs-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: c86bd12f777b0de488d424e6f18251b41c57893fb0c3a6fcafad6052e2f7ef29 |
gpxe-roms-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 99dc473fc4228041264e10c38d19941ca4ff25ea2f20864f43b42a29ab75b431 |
gpxe-roms-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 99dc473fc4228041264e10c38d19941ca4ff25ea2f20864f43b42a29ab75b431 |
gpxe-roms-qemu-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 62ec16019c7ae6d5992ec0aa8046f510b47e0976fc859228573bf407e30e4152 |
gpxe-roms-qemu-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 62ec16019c7ae6d5992ec0aa8046f510b47e0976fc859228573bf407e30e4152 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
gpxe-0.9.7-6.3.el6_0.1.src.rpm | SHA-256: adf8c602d8244ba0126d058051328e7fa65eaf134ced982aabc8456d890dfa45 |
x86_64 | |
gpxe-bootimgs-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: c86bd12f777b0de488d424e6f18251b41c57893fb0c3a6fcafad6052e2f7ef29 |
gpxe-roms-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 99dc473fc4228041264e10c38d19941ca4ff25ea2f20864f43b42a29ab75b431 |
gpxe-roms-qemu-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 62ec16019c7ae6d5992ec0aa8046f510b47e0976fc859228573bf407e30e4152 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
gpxe-0.9.7-6.3.el6_0.1.src.rpm | SHA-256: adf8c602d8244ba0126d058051328e7fa65eaf134ced982aabc8456d890dfa45 |
x86_64 | |
gpxe-bootimgs-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: c86bd12f777b0de488d424e6f18251b41c57893fb0c3a6fcafad6052e2f7ef29 |
gpxe-roms-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 99dc473fc4228041264e10c38d19941ca4ff25ea2f20864f43b42a29ab75b431 |
gpxe-roms-qemu-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 62ec16019c7ae6d5992ec0aa8046f510b47e0976fc859228573bf407e30e4152 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
gpxe-0.9.7-6.3.el6_0.1.src.rpm | SHA-256: adf8c602d8244ba0126d058051328e7fa65eaf134ced982aabc8456d890dfa45 |
x86_64 | |
gpxe-bootimgs-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: c86bd12f777b0de488d424e6f18251b41c57893fb0c3a6fcafad6052e2f7ef29 |
gpxe-roms-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 99dc473fc4228041264e10c38d19941ca4ff25ea2f20864f43b42a29ab75b431 |
gpxe-roms-qemu-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 62ec16019c7ae6d5992ec0aa8046f510b47e0976fc859228573bf407e30e4152 |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
gpxe-0.9.7-6.3.el6_0.1.src.rpm | SHA-256: adf8c602d8244ba0126d058051328e7fa65eaf134ced982aabc8456d890dfa45 |
x86_64 | |
gpxe-bootimgs-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: c86bd12f777b0de488d424e6f18251b41c57893fb0c3a6fcafad6052e2f7ef29 |
gpxe-roms-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 99dc473fc4228041264e10c38d19941ca4ff25ea2f20864f43b42a29ab75b431 |
gpxe-roms-qemu-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 62ec16019c7ae6d5992ec0aa8046f510b47e0976fc859228573bf407e30e4152 |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
gpxe-0.9.7-6.3.el6_0.1.src.rpm | SHA-256: adf8c602d8244ba0126d058051328e7fa65eaf134ced982aabc8456d890dfa45 |
x86_64 | |
gpxe-bootimgs-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: c86bd12f777b0de488d424e6f18251b41c57893fb0c3a6fcafad6052e2f7ef29 |
gpxe-roms-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 99dc473fc4228041264e10c38d19941ca4ff25ea2f20864f43b42a29ab75b431 |
gpxe-roms-qemu-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 62ec16019c7ae6d5992ec0aa8046f510b47e0976fc859228573bf407e30e4152 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6
SRPM | |
---|---|
gpxe-0.9.7-6.3.el6_0.1.src.rpm | SHA-256: adf8c602d8244ba0126d058051328e7fa65eaf134ced982aabc8456d890dfa45 |
x86_64 | |
gpxe-bootimgs-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: c86bd12f777b0de488d424e6f18251b41c57893fb0c3a6fcafad6052e2f7ef29 |
gpxe-roms-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 99dc473fc4228041264e10c38d19941ca4ff25ea2f20864f43b42a29ab75b431 |
gpxe-roms-qemu-0.9.7-6.3.el6_0.1.noarch.rpm | SHA-256: 62ec16019c7ae6d5992ec0aa8046f510b47e0976fc859228573bf407e30e4152 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.