Bug Fix Advisory grubby bug fix update

Advisory: RHBA-2017:0510-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2017-03-14
Last updated on: 2017-03-14
Affected Products: Red Hat Enterprise Linux HPC Node EUS (v. 7.2)
Red Hat Enterprise Linux Server AUS (v. 7.2)
Red Hat Enterprise Linux Server EUS (v. 7.2)
Red Hat Enterprise Linux Server TUS (v. 7.2)

Details

Updated grubby packages that fix one bug are now available for Red Hat
Enterprise Linux 7.2 Extended Update Support.

The grubby packages provide grubby, a command-line utility for displaying and
editing Grand Unified Bootloader (GRUB) configuration files.

This update fixes the following bug:

* Previously, the grubby tool always set the newly added kernel as the default.
The new-kernel-pkg tool originally added the debug boot entry and the normal
boot entry, respectively. This caused that the debugging arguments were
installed into non-debugging boot entries.

With this update, the invocations in new-kernel-pkg have been fixed to install
the debug entry and the normal entry, respectively. As a result, grubby now does
not automatically set the latest added boot entry as the default entry and the
order of boot entries is set to "normal kernel" and "with debugging",
respectively. (BZ#1420748)

Users of grubby are advised to upgrade to these updated packages, which fix this
bug.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Updated packages

Red Hat Enterprise Linux HPC Node EUS (v. 7.2)

SRPMS:
grubby-8.28-19.el7_2.src.rpm     MD5: df95a48c17bb12205021923fe82cba58
SHA-256: 42b7dd58d38d7962b96244393a4c66747ddca843585e4d0931706b6c421b03f4
 
x86_64:
grubby-8.28-19.el7_2.x86_64.rpm     MD5: 7eec79659d74fcf8931a61ba436c9c8b
SHA-256: 3dcb21dba0e0466dc3e8d4c7fff47c48d4dfd87b23d5416d3f6d2534c764083b
grubby-debuginfo-8.28-19.el7_2.x86_64.rpm     MD5: ee678d5c7cb338651bd676a8134199dd
SHA-256: 95f7883efb4b24c365e982e181a67ee1f6e31d6f898bdd182829b2ef23292920
 
Red Hat Enterprise Linux Server AUS (v. 7.2)

SRPMS:
grubby-8.28-19.el7_2.src.rpm     MD5: df95a48c17bb12205021923fe82cba58
SHA-256: 42b7dd58d38d7962b96244393a4c66747ddca843585e4d0931706b6c421b03f4
 
x86_64:
grubby-8.28-19.el7_2.x86_64.rpm     MD5: 7eec79659d74fcf8931a61ba436c9c8b
SHA-256: 3dcb21dba0e0466dc3e8d4c7fff47c48d4dfd87b23d5416d3f6d2534c764083b
grubby-debuginfo-8.28-19.el7_2.x86_64.rpm     MD5: ee678d5c7cb338651bd676a8134199dd
SHA-256: 95f7883efb4b24c365e982e181a67ee1f6e31d6f898bdd182829b2ef23292920
 
Red Hat Enterprise Linux Server EUS (v. 7.2)

SRPMS:
grubby-8.28-19.el7_2.src.rpm     MD5: df95a48c17bb12205021923fe82cba58
SHA-256: 42b7dd58d38d7962b96244393a4c66747ddca843585e4d0931706b6c421b03f4
 
PPC:
grubby-8.28-19.el7_2.ppc64.rpm     MD5: 1b0fe9e0cfc295ee554af07729cbb242
SHA-256: e4ebd9aef8b48d9e27fe2ac43227ff5d852b031cff649c97635be0ea4ff2d781
grubby-debuginfo-8.28-19.el7_2.ppc64.rpm     MD5: 9e26fd778c60f94f2a09054c39b1a1d6
SHA-256: 83abb4ccaa21e2cf939c7415c57dd69535685dff174195f52a8539c8763645da
 
PPC64LE:
grubby-8.28-19.el7_2.ppc64le.rpm     MD5: 8d5c27bd767fa16da1ccbc1b9f20f57e
SHA-256: 20f15de3f840cd75f4c985168350bf34b440c9666d54e1c824e25bc52e6a350a
grubby-debuginfo-8.28-19.el7_2.ppc64le.rpm     MD5: 4daa35fab9975d32af7231af80cd22df
SHA-256: 5d45206a1f08817b432d1d0c75431980b473312ff8fa6494df8c9322a7825b7f
 
s390x:
grubby-8.28-19.el7_2.s390x.rpm     MD5: 946a0cfd40fbdea3fddd20a3628fb1d8
SHA-256: 481a2d6f9db81cc349b5cc5306ef63e6fd25c4bb86b1ac55490165be6fa22f66
grubby-debuginfo-8.28-19.el7_2.s390x.rpm     MD5: 4c05203d3eebb73d620aaa5f895dfe05
SHA-256: 978a6da66c10a7e1c1e3898ddc6d78ca7442508c682b801169aa722a0fc1ebec
 
x86_64:
grubby-8.28-19.el7_2.x86_64.rpm     MD5: 7eec79659d74fcf8931a61ba436c9c8b
SHA-256: 3dcb21dba0e0466dc3e8d4c7fff47c48d4dfd87b23d5416d3f6d2534c764083b
grubby-debuginfo-8.28-19.el7_2.x86_64.rpm     MD5: ee678d5c7cb338651bd676a8134199dd
SHA-256: 95f7883efb4b24c365e982e181a67ee1f6e31d6f898bdd182829b2ef23292920
 
Red Hat Enterprise Linux Server TUS (v. 7.2)

SRPMS:
grubby-8.28-19.el7_2.src.rpm     MD5: df95a48c17bb12205021923fe82cba58
SHA-256: 42b7dd58d38d7962b96244393a4c66747ddca843585e4d0931706b6c421b03f4
 
x86_64:
grubby-8.28-19.el7_2.x86_64.rpm     MD5: 7eec79659d74fcf8931a61ba436c9c8b
SHA-256: 3dcb21dba0e0466dc3e8d4c7fff47c48d4dfd87b23d5416d3f6d2534c764083b
grubby-debuginfo-8.28-19.el7_2.x86_64.rpm     MD5: ee678d5c7cb338651bd676a8134199dd
SHA-256: 95f7883efb4b24c365e982e181a67ee1f6e31d6f898bdd182829b2ef23292920
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1420748 - Incorrect ordering of boot menu entries generated by grubby



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/