- Issued:
- 2017-03-28
- Updated:
- 2017-03-28
RHBA-2017:0846 - Bug Fix Advisory
Synopsis
grubby bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated grubby packages that fix one bug are now available for Red Hat Enterprise Linux 7.1 Extended Update Support.
Description
The grubby packages provide grubby, a command-line utility for displaying and editing Grand Unified Bootloader (GRUB) configuration files.
This update fixes the following bug:
- Previously, the grubby tool always set the newly added kernel as the default. The new-kernel-pkg tool originally added the debug boot entry and the normal boot entry, respectively. This caused that the debugging arguments were installed into non-debugging boot entries.
With this update, the invocations in new-kernel-pkg have been fixed to install the debug entry and the normal entry, respectively. As a result, grubby now does not automatically set the latest added boot entry as the default entry and the order of boot entries is set to "normal kernel" and "with debugging", respectively. (BZ#1420746)
Users of grubby are advised to upgrade to these updated packages, which fix this bug.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.1 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.1 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.1 ppc64
- Red Hat Enterprise Linux EUS Compute Node 7.1 x86_64
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.1 ppc64le
Fixes
- BZ - 1420746 - Incorrect ordering of boot menu entries generated by grubby
CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.1
SRPM | |
---|---|
grubby-8.28-13.el7_1.src.rpm | SHA-256: 5c3f205c3b7660f905b9b9adeea0b9d1048838bac1ff7be25b019c550818c807 |
x86_64 | |
grubby-8.28-13.el7_1.x86_64.rpm | SHA-256: 213b83f659f6d8b500b546ee5b725b876f86068a66022345c931968b054c263d |
grubby-debuginfo-8.28-13.el7_1.x86_64.rpm | SHA-256: e31c4b7eac1fbc4de64db91c841a1b944f5e1c4bc0dc6c5f11a4f27974030c2a |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 7.1
SRPM | |
---|---|
grubby-8.28-13.el7_1.src.rpm | SHA-256: 5c3f205c3b7660f905b9b9adeea0b9d1048838bac1ff7be25b019c550818c807 |
s390x | |
grubby-8.28-13.el7_1.s390x.rpm | SHA-256: 4603e7f065619bf30936de969c3863046250fc94d1e59e92797f332e56e22ed9 |
grubby-debuginfo-8.28-13.el7_1.s390x.rpm | SHA-256: 71118e753dd835c29e0f5e6308921ca936ce5fd95c318d1e9fa001226b9a92b8 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.1
SRPM | |
---|---|
grubby-8.28-13.el7_1.src.rpm | SHA-256: 5c3f205c3b7660f905b9b9adeea0b9d1048838bac1ff7be25b019c550818c807 |
ppc64 | |
grubby-8.28-13.el7_1.ppc64.rpm | SHA-256: 58bb35925d617018f172ff25d26c59f00b2cef501232144ed7111d746ffe6bfd |
grubby-debuginfo-8.28-13.el7_1.ppc64.rpm | SHA-256: fc2731d73b215548e955cd787beb1f5ced9c108c2511902c2d7439e30b0d3ece |
Red Hat Enterprise Linux EUS Compute Node 7.1
SRPM | |
---|---|
grubby-8.28-13.el7_1.src.rpm | SHA-256: 5c3f205c3b7660f905b9b9adeea0b9d1048838bac1ff7be25b019c550818c807 |
x86_64 | |
grubby-8.28-13.el7_1.x86_64.rpm | SHA-256: 213b83f659f6d8b500b546ee5b725b876f86068a66022345c931968b054c263d |
grubby-debuginfo-8.28-13.el7_1.x86_64.rpm | SHA-256: e31c4b7eac1fbc4de64db91c841a1b944f5e1c4bc0dc6c5f11a4f27974030c2a |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.1
SRPM | |
---|---|
grubby-8.28-13.ael7b_1.src.rpm | SHA-256: 92d22fbbe47ed51c676727c9f9fe6f59db145f194b46cbea03f84b7171795e6a |
ppc64le | |
grubby-8.28-13.ael7b_1.ppc64le.rpm | SHA-256: 2fceafab88d499e749ec45ebf056b3fa451f4f9494b7700cd6f0359fb24e219e |
grubby-debuginfo-8.28-13.ael7b_1.ppc64le.rpm | SHA-256: 98ceddf53e56e82dfeadea29dc92e7999676414aa3ee97c2f809c78363744056 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.