- Issued:
- 2018-04-10
- Updated:
- 2018-04-10
RHBA-2018:0902 - Bug Fix Advisory
Synopsis
OVMF bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Topic
An update for OVMF is now available for Red Hat Enterprise Linux 7.
Description
OVMF (Open Virtual Machine Firmware) is a project to enable UEFI support for Virtual Machines. This package contains a sample 64-bit UEFI firmware for QEMU and KVM.
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.
Users of OVMF are advised to upgrade to these updated packages.
Solution
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 7 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support 7.6 x86_64
- Red Hat Enterprise Linux Server - AUS 7.6 x86_64
- Red Hat Enterprise Linux Server - TUS 7.6 x86_64
- Red Hat Enterprise Linux for ARM 64 7 aarch64
- Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6 x86_64
Fixes
- BZ - 1434740 - OvmfPkg/PciHotPlugInitDxe: don't reserve IO space when IO support is disabled
- BZ - 1434747 - [Q35] code12 error when hotplug XL710 device in win2016
- BZ - 1441550 - [ovmf] It's very slow to boot guest with multiple virtio-net-pci with q35+ovmf [TestOnly]
- BZ - 1447027 - Guest cannot boot with 240 or above vcpus when using ovmf
- BZ - 1458192 - [Q35] recognize "usb-storage" devices in XHCI ports
- BZ - 1468526 - >1TB RAM support
- BZ - 1469787 - Rebase OVMF for RHEL-7.5
- BZ - 1496170 - Inconsistent MOR control variables exposed by OVMF, breaks Windows Device Guard
- BZ - 1514105 - backport edk2 commit 6e3287442774 so that PciBusDxe not over-claim resources
- BZ - 1515418 - RFE: Provide diagnostics for failed boot
- BZ - 1518308 - UEFI memory map regression (runtime code entry splitting) introduced by c1cab54ce57c
- BZ - 1520485 - AAVMF: two new messages with silent build
CVEs
(none)
References
Red Hat Enterprise Linux Server 7
| SRPM | |
|---|---|
| ovmf-20171011-4.git92d07e48907f.el7.src.rpm | SHA-256: a9dea9e43a1422ff14ca22f04c9780325774e00d38394ce8e2b10996eea77b78 |
| x86_64 | |
| OVMF-20171011-4.git92d07e48907f.el7.noarch.rpm | SHA-256: 654d5e42f0df59cfbf50676e7b923d4ef93c6c5e7f0b5fe1d56b4a08359d7307 |
Red Hat Enterprise Linux Server - Extended Update Support 7.6
| SRPM | |
|---|---|
| ovmf-20171011-4.git92d07e48907f.el7.src.rpm | SHA-256: a9dea9e43a1422ff14ca22f04c9780325774e00d38394ce8e2b10996eea77b78 |
| x86_64 | |
| OVMF-20171011-4.git92d07e48907f.el7.noarch.rpm | SHA-256: 654d5e42f0df59cfbf50676e7b923d4ef93c6c5e7f0b5fe1d56b4a08359d7307 |
Red Hat Enterprise Linux Server - AUS 7.6
| SRPM | |
|---|---|
| ovmf-20171011-4.git92d07e48907f.el7.src.rpm | SHA-256: a9dea9e43a1422ff14ca22f04c9780325774e00d38394ce8e2b10996eea77b78 |
| x86_64 | |
| OVMF-20171011-4.git92d07e48907f.el7.noarch.rpm | SHA-256: 654d5e42f0df59cfbf50676e7b923d4ef93c6c5e7f0b5fe1d56b4a08359d7307 |
Red Hat Enterprise Linux Server - TUS 7.6
| SRPM | |
|---|---|
| ovmf-20171011-4.git92d07e48907f.el7.src.rpm | SHA-256: a9dea9e43a1422ff14ca22f04c9780325774e00d38394ce8e2b10996eea77b78 |
| x86_64 | |
| OVMF-20171011-4.git92d07e48907f.el7.noarch.rpm | SHA-256: 654d5e42f0df59cfbf50676e7b923d4ef93c6c5e7f0b5fe1d56b4a08359d7307 |
Red Hat Enterprise Linux for ARM 64 7
| SRPM | |
|---|---|
| ovmf-20171011-4.git92d07e48907f.el7.src.rpm | SHA-256: a9dea9e43a1422ff14ca22f04c9780325774e00d38394ce8e2b10996eea77b78 |
| aarch64 | |
| AAVMF-20171011-4.git92d07e48907f.el7.noarch.rpm | SHA-256: 169f3b66cc3287b6227b0d8f99c6d0194aa4536e3b02d43ee820c4604b97a5ee |
Red Hat Enterprise Linux Server - Update Services for SAP Solutions 7.6
| SRPM | |
|---|---|
| ovmf-20171011-4.git92d07e48907f.el7.src.rpm | SHA-256: a9dea9e43a1422ff14ca22f04c9780325774e00d38394ce8e2b10996eea77b78 |
| x86_64 | |
| OVMF-20171011-4.git92d07e48907f.el7.noarch.rpm | SHA-256: 654d5e42f0df59cfbf50676e7b923d4ef93c6c5e7f0b5fe1d56b4a08359d7307 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
