- Issued:
- 2017-08-08
- Updated:
- 2017-08-08
RHBA-2017:2439 - Bug Fix Advisory
Synopsis
seabios bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated seabios packages that fix one bug are now available for Red Hat Enterprise Linux 7.3 Extended Update Support.
Description
The seabios packages contain an open-source legacy BIOS implementation, which can be used as a coreboot payload. It implements the standard BIOS calling interfaces that a typical x86 proprietary BIOS implements.
This update fixes the following bug:
- Previously, an unused seabios feature caused a memory corruption in virtual machines (VMs). As a consequence, converting a VM image to the Red Hat Enterprise Virtualization (RHEV) format using the virt-v2v utility entered an indefinite loop during the Pre-Boot Execution Environment (PXE) boot stage. With this update, the seabios feature has been disabled, and the described problem no longer occurs. (BZ#1468480)
Users of seabios are advised to upgrade to these updated packages, which fix this bug.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.3 x86_64
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3 ppc64
- Red Hat Enterprise Linux EUS Compute Node 7.3 x86_64
- Red Hat Enterprise Linux Server - AUS 7.3 x86_64
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.3 ppc64le
- Red Hat Enterprise Linux Server - TUS 7.3 x86_64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.3 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.3 x86_64
Fixes
- BZ - 1468480 - seabios hangs in PXE option ROM
CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 7.3
SRPM | |
---|---|
seabios-1.9.1-5.el7_3.4.src.rpm | SHA-256: 867f05a2256b18145df48a4073d7f2ddbf0fe981efeec75f571ff6ae35bbe9af |
x86_64 | |
seabios-1.9.1-5.el7_3.4.x86_64.rpm | SHA-256: a17b71160e93a8a60fe9f58e4e1d58b62330735d57a62d20f9026d4eb51d4137 |
seabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 2504b5d29cce633bbc4fc399f4efdcc012d161ec19a113828a6c42f611c48079 |
seavgabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 070d66f39136b6f388aff944daea3d8bde6480d5f8b952945be4192ed067f464 |
Red Hat Enterprise Linux EUS Compute Node 7.3
SRPM | |
---|---|
seabios-1.9.1-5.el7_3.4.src.rpm | SHA-256: 867f05a2256b18145df48a4073d7f2ddbf0fe981efeec75f571ff6ae35bbe9af |
x86_64 | |
seabios-1.9.1-5.el7_3.4.x86_64.rpm | SHA-256: a17b71160e93a8a60fe9f58e4e1d58b62330735d57a62d20f9026d4eb51d4137 |
seabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 2504b5d29cce633bbc4fc399f4efdcc012d161ec19a113828a6c42f611c48079 |
seavgabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 070d66f39136b6f388aff944daea3d8bde6480d5f8b952945be4192ed067f464 |
Red Hat Enterprise Linux Server - AUS 7.3
SRPM | |
---|---|
seabios-1.9.1-5.el7_3.4.src.rpm | SHA-256: 867f05a2256b18145df48a4073d7f2ddbf0fe981efeec75f571ff6ae35bbe9af |
x86_64 | |
seabios-1.9.1-5.el7_3.4.x86_64.rpm | SHA-256: a17b71160e93a8a60fe9f58e4e1d58b62330735d57a62d20f9026d4eb51d4137 |
seabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 2504b5d29cce633bbc4fc399f4efdcc012d161ec19a113828a6c42f611c48079 |
seavgabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 070d66f39136b6f388aff944daea3d8bde6480d5f8b952945be4192ed067f464 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 7.3
SRPM | |
---|---|
seabios-1.9.1-5.el7_3.4.src.rpm | SHA-256: 867f05a2256b18145df48a4073d7f2ddbf0fe981efeec75f571ff6ae35bbe9af |
ppc64 | |
seabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 2504b5d29cce633bbc4fc399f4efdcc012d161ec19a113828a6c42f611c48079 |
seavgabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 070d66f39136b6f388aff944daea3d8bde6480d5f8b952945be4192ed067f464 |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 7.3
SRPM | |
---|---|
seabios-1.9.1-5.el7_3.4.src.rpm | SHA-256: 867f05a2256b18145df48a4073d7f2ddbf0fe981efeec75f571ff6ae35bbe9af |
ppc64le | |
seabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 2504b5d29cce633bbc4fc399f4efdcc012d161ec19a113828a6c42f611c48079 |
seavgabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 070d66f39136b6f388aff944daea3d8bde6480d5f8b952945be4192ed067f464 |
Red Hat Enterprise Linux Server - TUS 7.3
SRPM | |
---|---|
seabios-1.9.1-5.el7_3.4.src.rpm | SHA-256: 867f05a2256b18145df48a4073d7f2ddbf0fe981efeec75f571ff6ae35bbe9af |
x86_64 | |
seabios-1.9.1-5.el7_3.4.x86_64.rpm | SHA-256: a17b71160e93a8a60fe9f58e4e1d58b62330735d57a62d20f9026d4eb51d4137 |
seabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 2504b5d29cce633bbc4fc399f4efdcc012d161ec19a113828a6c42f611c48079 |
seavgabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 070d66f39136b6f388aff944daea3d8bde6480d5f8b952945be4192ed067f464 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 7.3
SRPM | |
---|---|
seabios-1.9.1-5.el7_3.4.src.rpm | SHA-256: 867f05a2256b18145df48a4073d7f2ddbf0fe981efeec75f571ff6ae35bbe9af |
ppc64le | |
seabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 2504b5d29cce633bbc4fc399f4efdcc012d161ec19a113828a6c42f611c48079 |
seavgabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 070d66f39136b6f388aff944daea3d8bde6480d5f8b952945be4192ed067f464 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 7.3
SRPM | |
---|---|
seabios-1.9.1-5.el7_3.4.src.rpm | SHA-256: 867f05a2256b18145df48a4073d7f2ddbf0fe981efeec75f571ff6ae35bbe9af |
x86_64 | |
seabios-1.9.1-5.el7_3.4.x86_64.rpm | SHA-256: a17b71160e93a8a60fe9f58e4e1d58b62330735d57a62d20f9026d4eb51d4137 |
seabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 2504b5d29cce633bbc4fc399f4efdcc012d161ec19a113828a6c42f611c48079 |
seavgabios-bin-1.9.1-5.el7_3.4.noarch.rpm | SHA-256: 070d66f39136b6f388aff944daea3d8bde6480d5f8b952945be4192ed067f464 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.