Bug Fix Advisory grubby bug fix update

Advisory: RHBA-2013:1713-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-11-20
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated grubby packages that fix two bugs are now available for Red Hat
Enterprise Linux 6.

The grubby packages provide grubby, a command-line tool for displaying and
editing GRUB (GRand Unified Bootloader) configuration files.

This update fixes the following bugs:

* Previously, the grub.conf file was not properly updated after a kernel update
with the tboot bootloader. This was due to a bug in the grubby tool which caused
it to improperly interpret the grub.conf stanzas that had tboot in them. This
update enables grubby to read the HYPERVISOR and HYPERVISOR_ARGS parameters from
the /etc/sysconfig/kernel file in order for tboot to perform as intended.
(BZ#991197)

* Prior to this update, yum and anaconda upgrades could have failed with a
kernel panic on the AMD64 and Intel 64 architectures due to the RAM disk image
not being found. This only happened when tboot was installed, and the kernel
"%post" or "%posttrans" scripts were run. This update adds the initramfs disk
image to the grub entry, and kernel panic failures no longer occur in the
described scenario. (BZ#999908)

Users of grubby are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
grubby-7.0.15-5.el6.src.rpm
File outdated by:  RHBA-2014:1575
    MD5: 100c30a07b04bf87d933e2db79ff4d1d
SHA-256: b92e0ed79fb9fb3912726e49af83fe37a6b8eb7cdb29f3c4c946a2e9050e514e
 
IA-32:
grubby-7.0.15-5.el6.i686.rpm
File outdated by:  RHBA-2014:1575
    MD5: 3fa338f4945a88820f909435af692b8e
SHA-256: bb87d06219bfabfef7acbfb906c35bc4c9df29fde579cecd5fd9a8859dfc2c33
grubby-debuginfo-7.0.15-5.el6.i686.rpm
File outdated by:  RHBA-2014:1575
    MD5: d3555b1994b37627bcb5d3c051d42272
SHA-256: b1a923b0e1e31cafcd9869a158b4b006afa77aa09c75e39137e61a0aff85799a
 
x86_64:
grubby-7.0.15-5.el6.x86_64.rpm
File outdated by:  RHBA-2014:1575
    MD5: 1d78f58ca858861a3ba3d9cd66bbbc1e
SHA-256: 400b13dffeb83b7625c74de1574b47d774ef149721fe8d176702acc302ec8a97
grubby-debuginfo-7.0.15-5.el6.x86_64.rpm
File outdated by:  RHBA-2014:1575
    MD5: 8e0b230a4ba6a156e92d000a0423e526
SHA-256: ea2da5747759a9c1a51fcea5324f81e1c5fa2d2e4b71e912b12525a8f9a88c77
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
grubby-7.0.15-5.el6.src.rpm
File outdated by:  RHBA-2014:1575
    MD5: 100c30a07b04bf87d933e2db79ff4d1d
SHA-256: b92e0ed79fb9fb3912726e49af83fe37a6b8eb7cdb29f3c4c946a2e9050e514e
 
x86_64:
grubby-7.0.15-5.el6.x86_64.rpm
File outdated by:  RHBA-2014:1575
    MD5: 1d78f58ca858861a3ba3d9cd66bbbc1e
SHA-256: 400b13dffeb83b7625c74de1574b47d774ef149721fe8d176702acc302ec8a97
grubby-debuginfo-7.0.15-5.el6.x86_64.rpm
File outdated by:  RHBA-2014:1575
    MD5: 8e0b230a4ba6a156e92d000a0423e526
SHA-256: ea2da5747759a9c1a51fcea5324f81e1c5fa2d2e4b71e912b12525a8f9a88c77
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
grubby-7.0.15-5.el6.src.rpm
File outdated by:  RHBA-2014:1575
    MD5: 100c30a07b04bf87d933e2db79ff4d1d
SHA-256: b92e0ed79fb9fb3912726e49af83fe37a6b8eb7cdb29f3c4c946a2e9050e514e
 
IA-32:
grubby-7.0.15-5.el6.i686.rpm
File outdated by:  RHBA-2014:1575
    MD5: 3fa338f4945a88820f909435af692b8e
SHA-256: bb87d06219bfabfef7acbfb906c35bc4c9df29fde579cecd5fd9a8859dfc2c33
grubby-debuginfo-7.0.15-5.el6.i686.rpm
File outdated by:  RHBA-2014:1575
    MD5: d3555b1994b37627bcb5d3c051d42272
SHA-256: b1a923b0e1e31cafcd9869a158b4b006afa77aa09c75e39137e61a0aff85799a
 
PPC:
grubby-7.0.15-5.el6.ppc64.rpm
File outdated by:  RHBA-2014:1575
    MD5: 6adb989c4a2203121b103685bb81e64c
SHA-256: ce5c71226a38b1dbe8167f56c6358e129f067a1b2e20f9de8177171fd8f62090
grubby-debuginfo-7.0.15-5.el6.ppc64.rpm
File outdated by:  RHBA-2014:1575
    MD5: 4ee80a86866b38ad62b2f9dbe12053dc
SHA-256: 3a554572f3ba51a8a309fb896b925c0e11979e16fb95cdb3088a8158dc1f9f5e
 
s390x:
grubby-7.0.15-5.el6.s390x.rpm
File outdated by:  RHBA-2014:1575
    MD5: 041eeac41f31c85121352bd908c53bd8
SHA-256: c3f66622c89c3b4946a102a4c8c7e389ef311ea53efefd37a531c1c7ab626b00
grubby-debuginfo-7.0.15-5.el6.s390x.rpm
File outdated by:  RHBA-2014:1575
    MD5: 023c92e101fe0765e151d6476af93e1d
SHA-256: 1c13795e45b99ca53cd48c6b22bda38055e7d68bafe7aa75674213af14054279
 
x86_64:
grubby-7.0.15-5.el6.x86_64.rpm
File outdated by:  RHBA-2014:1575
    MD5: 1d78f58ca858861a3ba3d9cd66bbbc1e
SHA-256: 400b13dffeb83b7625c74de1574b47d774ef149721fe8d176702acc302ec8a97
grubby-debuginfo-7.0.15-5.el6.x86_64.rpm
File outdated by:  RHBA-2014:1575
    MD5: 8e0b230a4ba6a156e92d000a0423e526
SHA-256: ea2da5747759a9c1a51fcea5324f81e1c5fa2d2e4b71e912b12525a8f9a88c77
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
grubby-7.0.15-5.el6.src.rpm
File outdated by:  RHBA-2014:1575
    MD5: 100c30a07b04bf87d933e2db79ff4d1d
SHA-256: b92e0ed79fb9fb3912726e49af83fe37a6b8eb7cdb29f3c4c946a2e9050e514e
 
IA-32:
grubby-7.0.15-5.el6.i686.rpm
File outdated by:  RHBA-2014:1575
    MD5: 3fa338f4945a88820f909435af692b8e
SHA-256: bb87d06219bfabfef7acbfb906c35bc4c9df29fde579cecd5fd9a8859dfc2c33
grubby-debuginfo-7.0.15-5.el6.i686.rpm
File outdated by:  RHBA-2014:1575
    MD5: d3555b1994b37627bcb5d3c051d42272
SHA-256: b1a923b0e1e31cafcd9869a158b4b006afa77aa09c75e39137e61a0aff85799a
 
x86_64:
grubby-7.0.15-5.el6.x86_64.rpm
File outdated by:  RHBA-2014:1575
    MD5: 1d78f58ca858861a3ba3d9cd66bbbc1e
SHA-256: 400b13dffeb83b7625c74de1574b47d774ef149721fe8d176702acc302ec8a97
grubby-debuginfo-7.0.15-5.el6.x86_64.rpm
File outdated by:  RHBA-2014:1575
    MD5: 8e0b230a4ba6a156e92d000a0423e526
SHA-256: ea2da5747759a9c1a51fcea5324f81e1c5fa2d2e4b71e912b12525a8f9a88c77
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/