- Issued:
- 2013-02-20
- Updated:
- 2013-02-20
RHBA-2013:0428 - Bug Fix Advisory
Synopsis
grub bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated grub packages that fix several bugs and add two enhancements are now
available for Red Hat Enterprise Linux 6.
Description
The GRUB utility is a powerful boot loader, which can load a wide variety of
operating systems.
This update fixes the following bugs:
- When the BIOS was set to Unified Extensible Firmware Interface (UEFI) mode,
all legacy option ROMs in the setup were disabled, and the grub.efi utility was
loaded, an attempt to access the network with the NET0 protocol was not
successful and the "nd" root command did not work. This bug has been fixed and
GRUB works correctly in this situation. (BZ#783169)
- Previously, the GRUB utility did not scan for KVM virtio disks when creating a
device map. Consequently, these disks were not added to this map. This bug has
been fixed and GRUB now scans for vd* devices located in the /dev/ directory, so
virtio disks are added to a device map as expected. (BZ#814014)
- The GRUB utility did not pass high order address bits for the Extensible
Firmware Interface (EFI) memory map and system table high order bits. As a
consequence, the EFI system map and memory map did not work correctly on
computers with RAM bigger then 4 GB. This bug has been fixed by passing high
order address bits, so that grub works properly in the described scenario.
(BZ#825054)
- When symbolic links in the /dev/mapper/ directory were resolved to the
original file, this file did not match proper file entry in the device.map file.
Consequently, the grub-install package failed and an error message was returned.
With this update, symbolic links are now prevented to resolve in the
/dev/mapper/ directory. As a result, grub-install proceeds as expected.
(BZ#870420)
- Due to an error in the underlying source code, an incorrect attempt to
dereference a NULL pointer could previously cause GRUB to terminate
unexpectedly. This update corrects the underlying source code to prevent this
error so that GRUB no longer crashes. (BZ#876519)
This update also adds the following enhancements:
- This enhancement includes support for IPV6 UEFI 2.3.1 netboot, which was
previously missing. (BZ#642396)
- With this update, the users can use EFI boot partition as a root partition,
which can be specified in the grub.conf file. As a consequence, the users do not
have to specify particular drive, but can use the one specified in the EFI boot
manager. (BZ#737732)
All users of GRUB are advised to upgrade to these updated packages, which fix
these bugs and add these enhancements.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
grub-0.97-81.el6.src.rpm | SHA-256: 192a831a7131f703079e8eaa728f0938f5742c45ff64363e008e4a0ca0630afd |
x86_64 | |
grub-0.97-81.el6.x86_64.rpm | SHA-256: 9ac0af519406ca720d030a9c00e9183b9cb631296d7224eb097360f732b08103 |
grub-0.97-81.el6.x86_64.rpm | SHA-256: 9ac0af519406ca720d030a9c00e9183b9cb631296d7224eb097360f732b08103 |
grub-debuginfo-0.97-81.el6.x86_64.rpm | SHA-256: 0d0d5bc76e33ede1655462265322747bd10319307d4bbdaa3a0243373a2aa55f |
grub-debuginfo-0.97-81.el6.x86_64.rpm | SHA-256: 0d0d5bc76e33ede1655462265322747bd10319307d4bbdaa3a0243373a2aa55f |
i386 | |
grub-0.97-81.el6.i686.rpm | SHA-256: b4f94251e4dfa9f2e1d73154d94a02fe7b69ad7d359fe3eb4970e4c4c33eb665 |
grub-debuginfo-0.97-81.el6.i686.rpm | SHA-256: b5eff746dfef10975d65df05aaef1a4960f0ba7aa1726b0c97fdbe290a4d0df8 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
grub-0.97-81.el6.src.rpm | SHA-256: 192a831a7131f703079e8eaa728f0938f5742c45ff64363e008e4a0ca0630afd |
i386 | |
grub-0.97-81.el6.i686.rpm | SHA-256: b4f94251e4dfa9f2e1d73154d94a02fe7b69ad7d359fe3eb4970e4c4c33eb665 |
grub-debuginfo-0.97-81.el6.i686.rpm | SHA-256: b5eff746dfef10975d65df05aaef1a4960f0ba7aa1726b0c97fdbe290a4d0df8 |
x86_64 | |
grub-0.97-81.el6.x86_64.rpm | SHA-256: 9ac0af519406ca720d030a9c00e9183b9cb631296d7224eb097360f732b08103 |
grub-debuginfo-0.97-81.el6.x86_64.rpm | SHA-256: 0d0d5bc76e33ede1655462265322747bd10319307d4bbdaa3a0243373a2aa55f |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
grub-0.97-81.el6.src.rpm | SHA-256: 192a831a7131f703079e8eaa728f0938f5742c45ff64363e008e4a0ca0630afd |
x86_64 | |
grub-0.97-81.el6.x86_64.rpm | SHA-256: 9ac0af519406ca720d030a9c00e9183b9cb631296d7224eb097360f732b08103 |
grub-debuginfo-0.97-81.el6.x86_64.rpm | SHA-256: 0d0d5bc76e33ede1655462265322747bd10319307d4bbdaa3a0243373a2aa55f |
i386 | |
grub-0.97-81.el6.i686.rpm | SHA-256: b4f94251e4dfa9f2e1d73154d94a02fe7b69ad7d359fe3eb4970e4c4c33eb665 |
grub-debuginfo-0.97-81.el6.i686.rpm | SHA-256: b5eff746dfef10975d65df05aaef1a4960f0ba7aa1726b0c97fdbe290a4d0df8 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
grub-0.97-81.el6.src.rpm | SHA-256: 192a831a7131f703079e8eaa728f0938f5742c45ff64363e008e4a0ca0630afd |
x86_64 | |
grub-0.97-81.el6.x86_64.rpm | SHA-256: 9ac0af519406ca720d030a9c00e9183b9cb631296d7224eb097360f732b08103 |
grub-debuginfo-0.97-81.el6.x86_64.rpm | SHA-256: 0d0d5bc76e33ede1655462265322747bd10319307d4bbdaa3a0243373a2aa55f |
i386 | |
grub-0.97-81.el6.i686.rpm | SHA-256: b4f94251e4dfa9f2e1d73154d94a02fe7b69ad7d359fe3eb4970e4c4c33eb665 |
grub-debuginfo-0.97-81.el6.i686.rpm | SHA-256: b5eff746dfef10975d65df05aaef1a4960f0ba7aa1726b0c97fdbe290a4d0df8 |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
grub-0.97-81.el6.src.rpm | SHA-256: 192a831a7131f703079e8eaa728f0938f5742c45ff64363e008e4a0ca0630afd |
x86_64 | |
grub-0.97-81.el6.x86_64.rpm | SHA-256: 9ac0af519406ca720d030a9c00e9183b9cb631296d7224eb097360f732b08103 |
grub-debuginfo-0.97-81.el6.x86_64.rpm | SHA-256: 0d0d5bc76e33ede1655462265322747bd10319307d4bbdaa3a0243373a2aa55f |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
grub-0.97-81.el6.src.rpm | SHA-256: 192a831a7131f703079e8eaa728f0938f5742c45ff64363e008e4a0ca0630afd |
x86_64 | |
grub-0.97-81.el6.x86_64.rpm | SHA-256: 9ac0af519406ca720d030a9c00e9183b9cb631296d7224eb097360f732b08103 |
grub-debuginfo-0.97-81.el6.x86_64.rpm | SHA-256: 0d0d5bc76e33ede1655462265322747bd10319307d4bbdaa3a0243373a2aa55f |
i386 | |
grub-0.97-81.el6.i686.rpm | SHA-256: b4f94251e4dfa9f2e1d73154d94a02fe7b69ad7d359fe3eb4970e4c4c33eb665 |
grub-debuginfo-0.97-81.el6.i686.rpm | SHA-256: b5eff746dfef10975d65df05aaef1a4960f0ba7aa1726b0c97fdbe290a4d0df8 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6
SRPM | |
---|---|
grub-0.97-81.el6.src.rpm | SHA-256: 192a831a7131f703079e8eaa728f0938f5742c45ff64363e008e4a0ca0630afd |
x86_64 | |
grub-0.97-81.el6.x86_64.rpm | SHA-256: 9ac0af519406ca720d030a9c00e9183b9cb631296d7224eb097360f732b08103 |
grub-debuginfo-0.97-81.el6.x86_64.rpm | SHA-256: 0d0d5bc76e33ede1655462265322747bd10319307d4bbdaa3a0243373a2aa55f |
i386 | |
grub-0.97-81.el6.i686.rpm | SHA-256: b4f94251e4dfa9f2e1d73154d94a02fe7b69ad7d359fe3eb4970e4c4c33eb665 |
grub-debuginfo-0.97-81.el6.i686.rpm | SHA-256: b5eff746dfef10975d65df05aaef1a4960f0ba7aa1726b0c97fdbe290a4d0df8 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.