Skip to navigation

Bug Fix Advisory grub bug fix update

Advisory: RHBA-2013:0087-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated grub packages that fix three bugs are now available for Red Hat
Enterprise Linux 5.

The GRUB utility is responsible for booting the operating system kernel.

This update fixes the following bugs:

* The grub documentation contained incorrect information about the planned but
unimplemented "grub-set-default" command; the "savedefault" command has been
implemented instead, providing similar functionality. This update corrects the
grub documentation that now reflect only those commands which have been
implemented in GRUB. (BZ#212649)

* Prior to this update, the "grub-install" command was matching only against one
letter after the "sd" string in the disk's device path name. Consequently, disks
named "sdaa" and higher were not recognized as disks. The matching expression
has been changed and now the "grub-install" command matches against any number
of reasonable characters after the "sd" string in the disk's device path name.
(BZ#782096)

* Previously, the number of disks was hard-coded to a maximum of 8. As a
consequence, no more than 8 devices could be used. This update has changed the
definition of allowed disks to a maximum of 128 and now up to 128 devices can be
used. (BZ#829228)

All users of GRUB are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
grub-0.97-13.10.el5.src.rpm
File outdated by:  RHBA-2013:1775
    MD5: 153c3d87b8a139f2192009313aa3343b
SHA-256: 7728d0da54f8682bf782f322b18ace33cf20b5a7acca75592aff23a396cbc439
 
IA-32:
grub-0.97-13.10.el5.i386.rpm
File outdated by:  RHBA-2013:1775
    MD5: 880ee9e64387e50356df2895b260e9cc
SHA-256: 443795575c60a96ceb3719cfc56bea68109bc8aaf350c41ade5cc2b5c6756cb8
grub-debuginfo-0.97-13.10.el5.i386.rpm
File outdated by:  RHBA-2013:1775
    MD5: 4d64a35a5b66ec92a0a358159f6a1f24
SHA-256: 2c73997e61a0c63604b5755d7faa31675376d45fd32a60a85ade61fc792fa824
 
x86_64:
grub-0.97-13.10.el5.x86_64.rpm
File outdated by:  RHBA-2013:1775
    MD5: 4e086f54015cb20df1524adf3652bed8
SHA-256: c44d7c86999321ec9ac312c38e75bd518133e70030524ad2f25eefac73c89b1c
grub-debuginfo-0.97-13.10.el5.x86_64.rpm
File outdated by:  RHBA-2013:1775
    MD5: 63e058a0e11552b8a60efe68cff11bf3
SHA-256: 8b773dfabcb2b9c4a6efd8a99372d38f8ae5fb3d76208a77dccc99ced00e2d17
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
grub-0.97-13.10.el5.src.rpm
File outdated by:  RHBA-2013:1775
    MD5: 153c3d87b8a139f2192009313aa3343b
SHA-256: 7728d0da54f8682bf782f322b18ace33cf20b5a7acca75592aff23a396cbc439
 
IA-32:
grub-0.97-13.10.el5.i386.rpm
File outdated by:  RHBA-2013:1775
    MD5: 880ee9e64387e50356df2895b260e9cc
SHA-256: 443795575c60a96ceb3719cfc56bea68109bc8aaf350c41ade5cc2b5c6756cb8
grub-debuginfo-0.97-13.10.el5.i386.rpm
File outdated by:  RHBA-2013:1775
    MD5: 4d64a35a5b66ec92a0a358159f6a1f24
SHA-256: 2c73997e61a0c63604b5755d7faa31675376d45fd32a60a85ade61fc792fa824
 
x86_64:
grub-0.97-13.10.el5.x86_64.rpm
File outdated by:  RHBA-2013:1775
    MD5: 4e086f54015cb20df1524adf3652bed8
SHA-256: c44d7c86999321ec9ac312c38e75bd518133e70030524ad2f25eefac73c89b1c
grub-debuginfo-0.97-13.10.el5.x86_64.rpm
File outdated by:  RHBA-2013:1775
    MD5: 63e058a0e11552b8a60efe68cff11bf3
SHA-256: 8b773dfabcb2b9c4a6efd8a99372d38f8ae5fb3d76208a77dccc99ced00e2d17
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

212649 - Missing grub-set-default command



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/