openSUSE Security Update : dhcpcd (openSUSE-SU-2011:0342-1)

This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update fixes the following security issue :

A rogue DHCP server could instruct clients to use a host name that
contains shell meta characters. Since many scripts in the system do
not expect unusal characters in the system's host name the DHCP client
needs to sanitize the host name offered by the server (CVE-2011-0996).

This update also fixes the following non-security issues :

- 564441: e1000 and dhcpd hickup

- 565030: dhcpcd not using router component of dhcp server
option 33 (Static Route)

- 574938: Sysem Update Fails to deploy to Primary serve.

- 577402: dhcpcp with Patch bnc#565030 has netlink error
with /32 netmask

- 601704: dhcpcd: ignores link carrier and does not

- 654649: dhcpcd ignores -G (--nogateway) option and sets
default route

- 657402: dhcpcd sends RENEWAL as ethernet broadcast
instead of unicast

- 668194: dhcp client not working properly in Xen domU due
to partial checksum offload

See also :

Solution :

Update the affected dhcpcd package.

Risk factor :

Medium / CVSS Base Score : 6.8

Family: SuSE Local Security Checks

Nessus Plugin ID: 53707 ()

Bugtraq ID:

CVE ID: CVE-2011-0996

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now