- Issued:
- 2013-02-20
- Updated:
- 2013-02-20
RHBA-2013:0487 - Bug Fix Advisory
Synopsis
vgabios bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated vgabios package that fixes one bug is now available for Red Hat
Enterprise Linux 6.
Description
The vgabios package provides a GNU Lesser General Public License (LPGL)
implementation of a BIOS for video cards. The vgabios package contains BIOS
images that are intended to be used in the Kernel Virtual Machine (KVM).
This update fixes the following bug:
- Previously, an attempt to boot a Red Hat Enterprise Virtualization Hypervisor
ISO in a virtual machine was unsuccessful. The boot menu appeared but then
stopped responding. The underlying source code has been modified and the virtual
machine now works as expected in the described scenario. (BZ#840087)
All users of vgabios are advised to upgrade to this updated package, which fixes
this bug.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
Fixes
- BZ - 840087 - Unable to boot rhev-hypervisor6.iso in virtual machine for testing.
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
vgabios-0.6b-3.7.el6.src.rpm | SHA-256: 434d816a33e8647560dcadf4d1b40d2bbe92b6370a450e9d90943f4ced942eac |
x86_64 | |
vgabios-0.6b-3.7.el6.noarch.rpm | SHA-256: 7c9f939378ab6715db3194959b4c1f2222be50e058ea81d5b0b443b4ddaca10c |
vgabios-0.6b-3.7.el6.noarch.rpm | SHA-256: 7c9f939378ab6715db3194959b4c1f2222be50e058ea81d5b0b443b4ddaca10c |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
vgabios-0.6b-3.7.el6.src.rpm | SHA-256: 434d816a33e8647560dcadf4d1b40d2bbe92b6370a450e9d90943f4ced942eac |
x86_64 | |
vgabios-0.6b-3.7.el6.noarch.rpm | SHA-256: 7c9f939378ab6715db3194959b4c1f2222be50e058ea81d5b0b443b4ddaca10c |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
vgabios-0.6b-3.7.el6.src.rpm | SHA-256: 434d816a33e8647560dcadf4d1b40d2bbe92b6370a450e9d90943f4ced942eac |
x86_64 | |
vgabios-0.6b-3.7.el6.noarch.rpm | SHA-256: 7c9f939378ab6715db3194959b4c1f2222be50e058ea81d5b0b443b4ddaca10c |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
vgabios-0.6b-3.7.el6.src.rpm | SHA-256: 434d816a33e8647560dcadf4d1b40d2bbe92b6370a450e9d90943f4ced942eac |
x86_64 | |
vgabios-0.6b-3.7.el6.noarch.rpm | SHA-256: 7c9f939378ab6715db3194959b4c1f2222be50e058ea81d5b0b443b4ddaca10c |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
vgabios-0.6b-3.7.el6.src.rpm | SHA-256: 434d816a33e8647560dcadf4d1b40d2bbe92b6370a450e9d90943f4ced942eac |
x86_64 | |
vgabios-0.6b-3.7.el6.noarch.rpm | SHA-256: 7c9f939378ab6715db3194959b4c1f2222be50e058ea81d5b0b443b4ddaca10c |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
vgabios-0.6b-3.7.el6.src.rpm | SHA-256: 434d816a33e8647560dcadf4d1b40d2bbe92b6370a450e9d90943f4ced942eac |
x86_64 | |
vgabios-0.6b-3.7.el6.noarch.rpm | SHA-256: 7c9f939378ab6715db3194959b4c1f2222be50e058ea81d5b0b443b4ddaca10c |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6
SRPM | |
---|---|
vgabios-0.6b-3.7.el6.src.rpm | SHA-256: 434d816a33e8647560dcadf4d1b40d2bbe92b6370a450e9d90943f4ced942eac |
x86_64 | |
vgabios-0.6b-3.7.el6.noarch.rpm | SHA-256: 7c9f939378ab6715db3194959b4c1f2222be50e058ea81d5b0b443b4ddaca10c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.