- Issued:
- 2011-12-06
- Updated:
- 2011-12-06
RHEA-2011:1633 - Product Enhancement Advisory
Synopsis
new package: tboot
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
A new tboot package is now available for Red Hat Enterprise Linux 6.
Description
The tboot package provides Trusted Boot (tboot), an open source pre- kernel/VMM
module, that uses Intel Trusted Execution Technology (Intel TXT) to initialize
the launch of a operating system kernels and virtual machines.
This enhancement update adds tboot to Red Hat Enterprise Linux 6. (BZ#691617)
All users wishing to evaluate trusted boot capabilities are advised to install
this new package.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
tboot-1.5.0-0.1.20110714.el6.src.rpm | SHA-256: d18163e5974026ac8246466afaca54a143d756d266bcd8adb233c7a993343799 |
x86_64 | |
tboot-1.5.0-0.1.20110714.el6.x86_64.rpm | SHA-256: 4a42533df9ac73997db0ba976fe4a6f157b3a582378da263fb40d6bc4bceae07 |
tboot-debuginfo-1.5.0-0.1.20110714.el6.x86_64.rpm | SHA-256: 13555055ab2e055e131794e5609327628e8d9e3bbbf6b3545586e6bbe6755ab5 |
i386 | |
tboot-1.5.0-0.1.20110714.el6.i686.rpm | SHA-256: 332d90bd9a92b4f69a8eb0c0d0ab1c05585820731c607c14858b2014f72368fc |
tboot-debuginfo-1.5.0-0.1.20110714.el6.i686.rpm | SHA-256: 9b1291c5630643f0a62885affae513c3d8366946f7318169cb1aff3f75c3df2b |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
tboot-1.5.0-0.1.20110714.el6.src.rpm | SHA-256: d18163e5974026ac8246466afaca54a143d756d266bcd8adb233c7a993343799 |
x86_64 | |
tboot-1.5.0-0.1.20110714.el6.x86_64.rpm | SHA-256: 4a42533df9ac73997db0ba976fe4a6f157b3a582378da263fb40d6bc4bceae07 |
tboot-debuginfo-1.5.0-0.1.20110714.el6.x86_64.rpm | SHA-256: 13555055ab2e055e131794e5609327628e8d9e3bbbf6b3545586e6bbe6755ab5 |
i386 | |
tboot-1.5.0-0.1.20110714.el6.i686.rpm | SHA-256: 332d90bd9a92b4f69a8eb0c0d0ab1c05585820731c607c14858b2014f72368fc |
tboot-debuginfo-1.5.0-0.1.20110714.el6.i686.rpm | SHA-256: 9b1291c5630643f0a62885affae513c3d8366946f7318169cb1aff3f75c3df2b |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
tboot-1.5.0-0.1.20110714.el6.src.rpm | SHA-256: d18163e5974026ac8246466afaca54a143d756d266bcd8adb233c7a993343799 |
x86_64 | |
tboot-1.5.0-0.1.20110714.el6.x86_64.rpm | SHA-256: 4a42533df9ac73997db0ba976fe4a6f157b3a582378da263fb40d6bc4bceae07 |
tboot-debuginfo-1.5.0-0.1.20110714.el6.x86_64.rpm | SHA-256: 13555055ab2e055e131794e5609327628e8d9e3bbbf6b3545586e6bbe6755ab5 |
i386 | |
tboot-1.5.0-0.1.20110714.el6.i686.rpm | SHA-256: 332d90bd9a92b4f69a8eb0c0d0ab1c05585820731c607c14858b2014f72368fc |
tboot-debuginfo-1.5.0-0.1.20110714.el6.i686.rpm | SHA-256: 9b1291c5630643f0a62885affae513c3d8366946f7318169cb1aff3f75c3df2b |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
tboot-1.5.0-0.1.20110714.el6.src.rpm | SHA-256: d18163e5974026ac8246466afaca54a143d756d266bcd8adb233c7a993343799 |
x86_64 | |
tboot-1.5.0-0.1.20110714.el6.x86_64.rpm | SHA-256: 4a42533df9ac73997db0ba976fe4a6f157b3a582378da263fb40d6bc4bceae07 |
tboot-debuginfo-1.5.0-0.1.20110714.el6.x86_64.rpm | SHA-256: 13555055ab2e055e131794e5609327628e8d9e3bbbf6b3545586e6bbe6755ab5 |
i386 | |
tboot-1.5.0-0.1.20110714.el6.i686.rpm | SHA-256: 332d90bd9a92b4f69a8eb0c0d0ab1c05585820731c607c14858b2014f72368fc |
tboot-debuginfo-1.5.0-0.1.20110714.el6.i686.rpm | SHA-256: 9b1291c5630643f0a62885affae513c3d8366946f7318169cb1aff3f75c3df2b |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
tboot-1.5.0-0.1.20110714.el6.src.rpm | SHA-256: d18163e5974026ac8246466afaca54a143d756d266bcd8adb233c7a993343799 |
x86_64 | |
tboot-1.5.0-0.1.20110714.el6.x86_64.rpm | SHA-256: 4a42533df9ac73997db0ba976fe4a6f157b3a582378da263fb40d6bc4bceae07 |
tboot-debuginfo-1.5.0-0.1.20110714.el6.x86_64.rpm | SHA-256: 13555055ab2e055e131794e5609327628e8d9e3bbbf6b3545586e6bbe6755ab5 |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
tboot-1.5.0-0.1.20110714.el6.src.rpm | SHA-256: d18163e5974026ac8246466afaca54a143d756d266bcd8adb233c7a993343799 |
x86_64 | |
tboot-1.5.0-0.1.20110714.el6.x86_64.rpm | SHA-256: 4a42533df9ac73997db0ba976fe4a6f157b3a582378da263fb40d6bc4bceae07 |
tboot-debuginfo-1.5.0-0.1.20110714.el6.x86_64.rpm | SHA-256: 13555055ab2e055e131794e5609327628e8d9e3bbbf6b3545586e6bbe6755ab5 |
i386 | |
tboot-1.5.0-0.1.20110714.el6.i686.rpm | SHA-256: 332d90bd9a92b4f69a8eb0c0d0ab1c05585820731c607c14858b2014f72368fc |
tboot-debuginfo-1.5.0-0.1.20110714.el6.i686.rpm | SHA-256: 9b1291c5630643f0a62885affae513c3d8366946f7318169cb1aff3f75c3df2b |
Red Hat Enterprise Linux Server - Retired Extended Life Cycle Support 6
SRPM | |
---|---|
tboot-1.5.0-0.1.20110714.el6.src.rpm | SHA-256: d18163e5974026ac8246466afaca54a143d756d266bcd8adb233c7a993343799 |
x86_64 | |
tboot-1.5.0-0.1.20110714.el6.x86_64.rpm | SHA-256: 4a42533df9ac73997db0ba976fe4a6f157b3a582378da263fb40d6bc4bceae07 |
tboot-debuginfo-1.5.0-0.1.20110714.el6.x86_64.rpm | SHA-256: 13555055ab2e055e131794e5609327628e8d9e3bbbf6b3545586e6bbe6755ab5 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.