Skip to navigation

Bug Fix Advisory libdhcp bug fix update

Advisory: RHBA-2008:0850-3
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2008-10-13
Last updated on: 2008-10-13
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.2.z server)

Details

Updated libdhcp packages that fix a bug are now available.

libdhcp enables programs to invoke and control the Dynamic Host
Configuration Protocol (DHCP) clients: the Internet Software Consortium
(ISC) IPv4 DHCP client library, libdhcp4client, and the IPv6 DHCPv6 client
library, libdhcp6client, and provides network interface configuration
services for network parameter auto-configuration with DHCP.

When systems used NFS-mounted root file systems, the hostname was not set
to the hostname received from the DHCP server. In these updated packages,
the hostname is correctly set on systems that use NFS-mounted root file
systems.

Users of libdhcp are advised to upgrade to these updated packages, which
resolve this issue.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
libdhcp-1.20-5.el5_2.1.src.rpm
File outdated by:  RHBA-2012:0193
    MD5: 771c9f6b7efece5975856bbbba553162
 
IA-32:
libdhcp-devel-1.20-5.el5_2.1.i386.rpm
File outdated by:  RHBA-2012:0193
    MD5: 4a27cc61f21ea511c6a116ca38d846c5
 
x86_64:
libdhcp-devel-1.20-5.el5_2.1.i386.rpm
File outdated by:  RHBA-2012:0193
    MD5: 4a27cc61f21ea511c6a116ca38d846c5
libdhcp-devel-1.20-5.el5_2.1.x86_64.rpm
File outdated by:  RHBA-2012:0193
    MD5: e76b4675b3f5683d30d2944fc82060b3
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
libdhcp-1.20-5.el5_2.1.src.rpm
File outdated by:  RHBA-2012:0193
    MD5: 771c9f6b7efece5975856bbbba553162
 
IA-32:
libdhcp-1.20-5.el5_2.1.i386.rpm
File outdated by:  RHBA-2012:0193
    MD5: 7a2b8bc995b59a224c893534cadac798
libdhcp-devel-1.20-5.el5_2.1.i386.rpm
File outdated by:  RHBA-2012:0193
    MD5: 4a27cc61f21ea511c6a116ca38d846c5
 
IA-64:
libdhcp-1.20-5.el5_2.1.ia64.rpm
File outdated by:  RHBA-2012:0193
    MD5: df8818a8e4056947a6f8dfde0b87c49a
libdhcp-devel-1.20-5.el5_2.1.ia64.rpm
File outdated by:  RHBA-2012:0193
    MD5: 49dc7805b8b9609f18592cf662a09ad6
 
PPC:
libdhcp-1.20-5.el5_2.1.ppc.rpm
File outdated by:  RHBA-2012:0193
    MD5: 40cc670e5a448383c0373ce9972b2af2
libdhcp-1.20-5.el5_2.1.ppc64.rpm
File outdated by:  RHBA-2012:0193
    MD5: 4e2936139a7ff17e1f5db6058de05c25
libdhcp-devel-1.20-5.el5_2.1.ppc.rpm
File outdated by:  RHBA-2012:0193
    MD5: ac8e2ed8c3ee643bcc69b5305bf731a5
libdhcp-devel-1.20-5.el5_2.1.ppc64.rpm
File outdated by:  RHBA-2012:0193
    MD5: ed0619955f11064cfe98d2e33520789c
 
s390x:
libdhcp-1.20-5.el5_2.1.s390.rpm
File outdated by:  RHBA-2012:0193
    MD5: e023ac167fdb89568ee236043af541d6
libdhcp-1.20-5.el5_2.1.s390x.rpm
File outdated by:  RHBA-2012:0193
    MD5: 1bfb76c461be9b78ad97544cdfe15124
libdhcp-devel-1.20-5.el5_2.1.s390.rpm
File outdated by:  RHBA-2012:0193
    MD5: c44ced9ccf93d3c087c8247f1c1def98
libdhcp-devel-1.20-5.el5_2.1.s390x.rpm
File outdated by:  RHBA-2012:0193
    MD5: 0350bd928f3a579d9d595b5b32f0b8a8
 
x86_64:
libdhcp-1.20-5.el5_2.1.i386.rpm
File outdated by:  RHBA-2012:0193
    MD5: 7a2b8bc995b59a224c893534cadac798
libdhcp-1.20-5.el5_2.1.x86_64.rpm
File outdated by:  RHBA-2012:0193
    MD5: f38b020b5ae2d2b0c5ccf4c5e0c612ff
libdhcp-devel-1.20-5.el5_2.1.i386.rpm
File outdated by:  RHBA-2012:0193
    MD5: 4a27cc61f21ea511c6a116ca38d846c5
libdhcp-devel-1.20-5.el5_2.1.x86_64.rpm
File outdated by:  RHBA-2012:0193
    MD5: e76b4675b3f5683d30d2944fc82060b3
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
libdhcp-1.20-5.el5_2.1.src.rpm
File outdated by:  RHBA-2012:0193
    MD5: 771c9f6b7efece5975856bbbba553162
 
IA-32:
libdhcp-1.20-5.el5_2.1.i386.rpm
File outdated by:  RHBA-2012:0193
    MD5: 7a2b8bc995b59a224c893534cadac798
 
x86_64:
libdhcp-1.20-5.el5_2.1.i386.rpm
File outdated by:  RHBA-2012:0193
    MD5: 7a2b8bc995b59a224c893534cadac798
libdhcp-1.20-5.el5_2.1.x86_64.rpm
File outdated by:  RHBA-2012:0193
    MD5: f38b020b5ae2d2b0c5ccf4c5e0c612ff
 
Red Hat Enterprise Linux EUS (v. 5.2.z server)

SRPMS:
libdhcp-1.20-5.el5_2.1.src.rpm
File outdated by:  RHBA-2012:0193
    MD5: 771c9f6b7efece5975856bbbba553162
 
IA-32:
libdhcp-1.20-5.el5_2.1.i386.rpm     MD5: 7a2b8bc995b59a224c893534cadac798
libdhcp-devel-1.20-5.el5_2.1.i386.rpm     MD5: 4a27cc61f21ea511c6a116ca38d846c5
 
IA-64:
libdhcp-1.20-5.el5_2.1.ia64.rpm     MD5: df8818a8e4056947a6f8dfde0b87c49a
libdhcp-devel-1.20-5.el5_2.1.ia64.rpm     MD5: 49dc7805b8b9609f18592cf662a09ad6
 
PPC:
libdhcp-1.20-5.el5_2.1.ppc.rpm     MD5: 40cc670e5a448383c0373ce9972b2af2
libdhcp-1.20-5.el5_2.1.ppc64.rpm     MD5: 4e2936139a7ff17e1f5db6058de05c25
libdhcp-devel-1.20-5.el5_2.1.ppc.rpm     MD5: ac8e2ed8c3ee643bcc69b5305bf731a5
libdhcp-devel-1.20-5.el5_2.1.ppc64.rpm     MD5: ed0619955f11064cfe98d2e33520789c
 
s390x:
libdhcp-1.20-5.el5_2.1.s390.rpm     MD5: e023ac167fdb89568ee236043af541d6
libdhcp-1.20-5.el5_2.1.s390x.rpm     MD5: 1bfb76c461be9b78ad97544cdfe15124
libdhcp-devel-1.20-5.el5_2.1.s390.rpm     MD5: c44ced9ccf93d3c087c8247f1c1def98
libdhcp-devel-1.20-5.el5_2.1.s390x.rpm     MD5: 0350bd928f3a579d9d595b5b32f0b8a8
 
x86_64:
libdhcp-1.20-5.el5_2.1.i386.rpm     MD5: 7a2b8bc995b59a224c893534cadac798
libdhcp-1.20-5.el5_2.1.x86_64.rpm     MD5: f38b020b5ae2d2b0c5ccf4c5e0c612ff
libdhcp-devel-1.20-5.el5_2.1.i386.rpm     MD5: 4a27cc61f21ea511c6a116ca38d846c5
libdhcp-devel-1.20-5.el5_2.1.x86_64.rpm     MD5: e76b4675b3f5683d30d2944fc82060b3
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

458798 - [5.2 nfsroot] DHCP hostname not being set



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/