Bug Fix Advisory gpxe bug fix update

Advisory: RHBA-2013:1628-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-11-20
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated gpxe packages that fix one bug are now available for Red Hat Enterprise
Linux 6.

The gpxe packages provide gPXE, an open source Pre-boot Execution Environment
(PXE) implementation and bootloader.

This update fixes the following bug:

* A DHCP server can be configured to use the Pre-Boot Execution Environment
(PXE) to boot virtual machines using the gPXE utility. Previously, PXE boot
failed when the next-server details had come from a different DHCP server. This
update applies a patch to fix this bug and PXE boot now works as expected in the
described scenario. (BZ#972671)

Users of gpxe are advised to upgrade to these updated packages, which fix this
bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

x86_64:
gpxe-bootimgs-0.9.7-6.10.el6.noarch.rpm
File outdated by:  RHBA-2017:0739
    MD5: 38e3491013aa2536774e55cdb16928ab
SHA-256: a3768563ca2334d555ecd4fb1ffdf5a48b4df5849b626048776830ab74fe2bb5
gpxe-roms-0.9.7-6.10.el6.noarch.rpm
File outdated by:  RHBA-2017:0739
    MD5: 006624a1e5c091ef17432dc4ec0aed79
SHA-256: e172ed78cdc4449cfbce1afe9b41c2ba79a9dea933f26e2dea869a19c82be7ce
gpxe-roms-qemu-0.9.7-6.10.el6.noarch.rpm
File outdated by:  RHBA-2017:0739
    MD5: b659379cdfe17960a5b18ca9a485ed3e
SHA-256: 99b239427c380e5eab201cfaa13f22fa02aa17b75e383d5572ce86b7951d97a3
 
Red Hat Enterprise Linux HPC Node (v. 6)

x86_64:
gpxe-bootimgs-0.9.7-6.10.el6.noarch.rpm
File outdated by:  RHBA-2017:0739
    MD5: 38e3491013aa2536774e55cdb16928ab
SHA-256: a3768563ca2334d555ecd4fb1ffdf5a48b4df5849b626048776830ab74fe2bb5
gpxe-roms-0.9.7-6.10.el6.noarch.rpm
File outdated by:  RHBA-2017:0739
    MD5: 006624a1e5c091ef17432dc4ec0aed79
SHA-256: e172ed78cdc4449cfbce1afe9b41c2ba79a9dea933f26e2dea869a19c82be7ce
gpxe-roms-qemu-0.9.7-6.10.el6.noarch.rpm
File outdated by:  RHBA-2017:0739
    MD5: b659379cdfe17960a5b18ca9a485ed3e
SHA-256: 99b239427c380e5eab201cfaa13f22fa02aa17b75e383d5572ce86b7951d97a3
 
Red Hat Enterprise Linux Server (v. 6)

x86_64:
gpxe-bootimgs-0.9.7-6.10.el6.noarch.rpm
File outdated by:  RHBA-2017:0739
    MD5: 38e3491013aa2536774e55cdb16928ab
SHA-256: a3768563ca2334d555ecd4fb1ffdf5a48b4df5849b626048776830ab74fe2bb5
gpxe-roms-0.9.7-6.10.el6.noarch.rpm
File outdated by:  RHBA-2017:0739
    MD5: 006624a1e5c091ef17432dc4ec0aed79
SHA-256: e172ed78cdc4449cfbce1afe9b41c2ba79a9dea933f26e2dea869a19c82be7ce
gpxe-roms-qemu-0.9.7-6.10.el6.noarch.rpm
File outdated by:  RHBA-2017:0739
    MD5: b659379cdfe17960a5b18ca9a485ed3e
SHA-256: 99b239427c380e5eab201cfaa13f22fa02aa17b75e383d5572ce86b7951d97a3
 
Red Hat Enterprise Linux Workstation (v. 6)

x86_64:
gpxe-bootimgs-0.9.7-6.10.el6.noarch.rpm
File outdated by:  RHBA-2017:0739
    MD5: 38e3491013aa2536774e55cdb16928ab
SHA-256: a3768563ca2334d555ecd4fb1ffdf5a48b4df5849b626048776830ab74fe2bb5
gpxe-roms-0.9.7-6.10.el6.noarch.rpm
File outdated by:  RHBA-2017:0739
    MD5: 006624a1e5c091ef17432dc4ec0aed79
SHA-256: e172ed78cdc4449cfbce1afe9b41c2ba79a9dea933f26e2dea869a19c82be7ce
gpxe-roms-qemu-0.9.7-6.10.el6.noarch.rpm
File outdated by:  RHBA-2017:0739
    MD5: b659379cdfe17960a5b18ca9a485ed3e
SHA-256: 99b239427c380e5eab201cfaa13f22fa02aa17b75e383d5572ce86b7951d97a3
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/