- Issued:
- 2015-07-22
- Updated:
- 2015-07-22
RHEA-2015:1355 - Product Enhancement Advisory
Synopsis
seabios enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated seabios package that adds one enhancement is now available for Red
Hat Enterprise Linux 6.
Description
The seabios package contains an open-source legacy BIOS implementation which can
be used as a coreboot payload. It implements the standard BIOS calling
interfaces that a typical x86 proprietary BIOS implements.
This update adds the following enhancement:
- The user can now access the boot menu by pressing the ESC key. Previously, the
boot menu could only be accessed by pressing the F12 key. However, one some
platforms, F12 can be unavailable. For example, systems running the OS X
operating system can intercept certain function keys, including F12. With this
update, the user can use either ESC or F12 to access the boot menu. Therefore,
seabios avoids these potential problems associated with F12. (BZ#1131530)
Users of seabios are advised to upgrade to this updated package, which adds this
enhancement.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6 x86_64
Fixes
- BZ - 1129930 - fail to assign correct order for the boot device in seabios as we specified the bootindex in qemu-kvm cli(under the same virtio-scsi-pci)
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
seabios-0.6.1.2-30.el6.src.rpm | SHA-256: 03a532b9015aa9b96c017780bcd48daa21101485e6d0f1eeb3b369fd0055bf19 |
x86_64 | |
seabios-0.6.1.2-30.el6.x86_64.rpm | SHA-256: b3f57aa99677f9fb193ce67fef9b5c46e34032e30293c5483e1ab29e3be8b8a2 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
seabios-0.6.1.2-30.el6.src.rpm | SHA-256: 03a532b9015aa9b96c017780bcd48daa21101485e6d0f1eeb3b369fd0055bf19 |
x86_64 | |
seabios-0.6.1.2-30.el6.x86_64.rpm | SHA-256: b3f57aa99677f9fb193ce67fef9b5c46e34032e30293c5483e1ab29e3be8b8a2 |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
seabios-0.6.1.2-30.el6.src.rpm | SHA-256: 03a532b9015aa9b96c017780bcd48daa21101485e6d0f1eeb3b369fd0055bf19 |
x86_64 | |
seabios-0.6.1.2-30.el6.x86_64.rpm | SHA-256: b3f57aa99677f9fb193ce67fef9b5c46e34032e30293c5483e1ab29e3be8b8a2 |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
seabios-0.6.1.2-30.el6.src.rpm | SHA-256: 03a532b9015aa9b96c017780bcd48daa21101485e6d0f1eeb3b369fd0055bf19 |
x86_64 | |
seabios-0.6.1.2-30.el6.x86_64.rpm | SHA-256: b3f57aa99677f9fb193ce67fef9b5c46e34032e30293c5483e1ab29e3be8b8a2 |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
seabios-0.6.1.2-30.el6.src.rpm | SHA-256: 03a532b9015aa9b96c017780bcd48daa21101485e6d0f1eeb3b369fd0055bf19 |
x86_64 | |
seabios-0.6.1.2-30.el6.x86_64.rpm | SHA-256: b3f57aa99677f9fb193ce67fef9b5c46e34032e30293c5483e1ab29e3be8b8a2 |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
seabios-0.6.1.2-30.el6.src.rpm | SHA-256: 03a532b9015aa9b96c017780bcd48daa21101485e6d0f1eeb3b369fd0055bf19 |
x86_64 | |
seabios-0.6.1.2-30.el6.x86_64.rpm | SHA-256: b3f57aa99677f9fb193ce67fef9b5c46e34032e30293c5483e1ab29e3be8b8a2 |
Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6
SRPM | |
---|---|
seabios-0.6.1.2-30.el6.src.rpm | SHA-256: 03a532b9015aa9b96c017780bcd48daa21101485e6d0f1eeb3b369fd0055bf19 |
x86_64 | |
seabios-0.6.1.2-30.el6.x86_64.rpm | SHA-256: b3f57aa99677f9fb193ce67fef9b5c46e34032e30293c5483e1ab29e3be8b8a2 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.