openSUSE Security Update : dhcpcd (openSUSE-SU-2011:0342-1)

Medium Nessus Plugin ID 53707


The remote openSUSE host is missing a security update.


This update fixes the following security issue :

A rogue DHCP server could instruct clients to use a host name that contains shell meta characters. Since many scripts in the system do not expect unusal characters in the system's host name the DHCP client needs to sanitize the host name offered by the server (CVE-2011-0996).

This update also fixes the following non-security issues :

- 564441: e1000 and dhcpd hickup

- 565030: dhcpcd not using router component of dhcp server option 33 (Static Route)

- 574938: Sysem Update Fails to deploy to Primary serve.

- 577402: dhcpcp with Patch bnc#565030 has netlink error with /32 netmask

- 601704: dhcpcd: ignores link carrier and does not retransmit

- 654649: dhcpcd ignores -G (--nogateway) option and sets default route

- 657402: dhcpcd sends RENEWAL as ethernet broadcast instead of unicast

- 668194: dhcp client not working properly in Xen domU due to partial checksum offload


Update the affected dhcpcd package.

See Also

Plugin Details

Severity: Medium

ID: 53707

File Name: suse_11_2_dhcpcd-110411.nasl

Version: $Revision: 1.2 $

Type: local

Agent: unix

Published: 2011/05/05

Modified: 2014/06/13

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:dhcpcd, cpe:/o:novell:opensuse:11.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2011/04/11

Reference Information

CVE: CVE-2011-0996