Skip to navigation

Bug Fix Advisory etherboot bug fix update

Advisory: RHBA-2011:0982-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)

Details

Updated etherboot packages that fix two bugs are now available for Red Hat
Enterprise Linux 5.

Etherboot is an open source network bootloader. It provides a direct replacement
for proprietary Preboot eXecution Environment (PXE) ROMs. It also has many extra
features, such as DNS, HTTP and iSCSI.

This update fixes the following bugs:

* Prior to this update, the debuginfo in etherboot was empty. This update drops
the debuginfo package. Now, etherboot contains no more redundant subpackages.
(BZ#500578)

* Prior to this update, etherboot could loop forever if a valid PXE offer was
not received. Due to this problem, the Virtual Machine (VM) could become
unresponsive indefinitely. With this update, etherboot transfers in such cases
the control back to the basic input/output system (BIOS) of the VM. Now, the VM
can boot from the configured boot method. (BZ#655266)

All etherboot users are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259/

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
etherboot-5.4.4-15.el5.src.rpm
File outdated by:  RHBA-2013:0056
    MD5: f222a109b5853f8cb49b21bb6f17dee7
SHA-256: 46801af92040df706c05704a0f9152117874348ba39ace805a4b889e4c948d02
 
x86_64:
etherboot-pxes-5.4.4-15.el5.x86_64.rpm
File outdated by:  RHBA-2013:0056
    MD5: d719119e1d39393e3e9d0d1921df06cc
SHA-256: a64ed9362cf21cd6b7254ce851539074b318b34776afe6c256af5cefa058ce0f
etherboot-roms-5.4.4-15.el5.x86_64.rpm
File outdated by:  RHBA-2013:0056
    MD5: 4646e1bb0cb46c12ad98cdbf02e58124
SHA-256: fa8b48103745286c40c17c26d4504049556dd0e3afa0a8b2b86152780200531e
etherboot-roms-kvm-5.4.4-15.el5.x86_64.rpm
File outdated by:  RHBA-2013:0056
    MD5: 41226ecf0aa29cedb5488ea93bf1e762
SHA-256: 1013ab21a1c64e7285deda68aa4f1fff2fc9effb110a27b486b0ecd5cfcaab7c
etherboot-zroms-5.4.4-15.el5.x86_64.rpm
File outdated by:  RHBA-2013:0056
    MD5: 3495c4f0fc57d8861fe6d93226935cbc
SHA-256: 5b0f6032d862ef970b4f054526f2172398ff38035081ebf68a33a25b7d15935f
etherboot-zroms-kvm-5.4.4-15.el5.x86_64.rpm
File outdated by:  RHBA-2013:0056
    MD5: fec33084adae59cafdd2ca74d832d9d7
SHA-256: 26c994267882a65801c9b7a7b82ef47bf7e9d92be6957de6a625f05636e90ac8
 
RHEL Virtualization (v. 5 server)

SRPMS:
etherboot-5.4.4-15.el5.src.rpm
File outdated by:  RHBA-2013:0056
    MD5: f222a109b5853f8cb49b21bb6f17dee7
SHA-256: 46801af92040df706c05704a0f9152117874348ba39ace805a4b889e4c948d02
 
x86_64:
etherboot-pxes-5.4.4-15.el5.x86_64.rpm
File outdated by:  RHBA-2013:0056
    MD5: d719119e1d39393e3e9d0d1921df06cc
SHA-256: a64ed9362cf21cd6b7254ce851539074b318b34776afe6c256af5cefa058ce0f
etherboot-roms-5.4.4-15.el5.x86_64.rpm
File outdated by:  RHBA-2013:0056
    MD5: 4646e1bb0cb46c12ad98cdbf02e58124
SHA-256: fa8b48103745286c40c17c26d4504049556dd0e3afa0a8b2b86152780200531e
etherboot-roms-kvm-5.4.4-15.el5.x86_64.rpm
File outdated by:  RHBA-2013:0056
    MD5: 41226ecf0aa29cedb5488ea93bf1e762
SHA-256: 1013ab21a1c64e7285deda68aa4f1fff2fc9effb110a27b486b0ecd5cfcaab7c
etherboot-zroms-5.4.4-15.el5.x86_64.rpm
File outdated by:  RHBA-2013:0056
    MD5: 3495c4f0fc57d8861fe6d93226935cbc
SHA-256: 5b0f6032d862ef970b4f054526f2172398ff38035081ebf68a33a25b7d15935f
etherboot-zroms-kvm-5.4.4-15.el5.x86_64.rpm
File outdated by:  RHBA-2013:0056
    MD5: fec33084adae59cafdd2ca74d832d9d7
SHA-256: 26c994267882a65801c9b7a7b82ef47bf7e9d92be6957de6a625f05636e90ac8
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

500578 - etherboot-debuginfo is empty



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/