This service will be undergoing maintenance at 00:00 UTC, 2016-08-01. It is expected to last about 1 hours
Bug 706153 - (CVE-2011-0867) CVE-2011-0867 OpenJDK: NetworkInterface information leak (Networking, 7013969)
CVE-2011-0867 OpenJDK: NetworkInterface information leak (Networking, 7013969)
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
Unspecified Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,source=oracle,public=...
: Security
Depends On: 668488 676275 709375 709376 711408 711409 711410 720963 720964 720965 723824 723825 723826 729588 729589 729907 729908 729909
Blocks:
  Show dependency treegraph
 
Reported: 2011-05-19 12:14 EDT by Marc Schoenefeld
Modified: 2013-10-23 12:57 EDT (History)
7 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-05-06 03:29:12 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description Marc Schoenefeld 2011-05-19 12:14:03 EDT
An information leak flaw was found in the NetworkInterface class. An untrusted applet or application could use this flaw to access information about available network interfaces that should only be available to privileged code.
Comment 2 Marc Schoenefeld 2011-05-19 12:17:56 EDT
Reproducer can be found at http://slightlyrandombrokenthoughts.blogspot.com/2011/02/trusted-method-chaining-for-network.html
Comment 5 Tomas Hoger 2011-06-07 10:38:37 EDT
An information leak was found in NetworkInterface.  Unprivileged code could obtain certain network interface configuration information via trusted method chaining.  Details can be found in the blog post linked in comment #2.
Comment 7 errata-xmlrpc 2011-06-08 10:31:58 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:0856 https://rhn.redhat.com/errata/RHSA-2011-0856.html
Comment 8 errata-xmlrpc 2011-06-08 10:53:54 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2011:0857 https://rhn.redhat.com/errata/RHSA-2011-0857.html
Comment 9 errata-xmlrpc 2011-06-08 11:25:29 EDT
This issue has been addressed in following products:

  Extras for RHEL 4
  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2011:0860 https://rhn.redhat.com/errata/RHSA-2011-0860.html
Comment 11 errata-xmlrpc 2011-07-15 01:57:35 EDT
This issue has been addressed in following products:

  Extras for RHEL 4
  Supplementary for Red Hat Enterprise Linux 5
  Supplementary for Red Hat Enterprise Linux 6

Via RHSA-2011:0938 https://rhn.redhat.com/errata/RHSA-2011-0938.html
Comment 12 errata-xmlrpc 2011-07-22 18:54:49 EDT
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 6
  Extras for RHEL 4
  Supplementary for Red Hat Enterprise Linux 5

Via RHSA-2011:1087 https://rhn.redhat.com/errata/RHSA-2011-1087.html
Comment 13 errata-xmlrpc 2011-08-15 13:49:52 EDT
This issue has been addressed in following products:

  Supplementary for Red Hat Enterprise Linux 5
  Extras for RHEL 4

Via RHSA-2011:1159 https://rhn.redhat.com/errata/RHSA-2011-1159.html
Comment 14 errata-xmlrpc 2011-09-06 17:20:30 EDT
This issue has been addressed in following products:

  RHEL 4 for SAP
  RHEL 5 for SAP
  RHEL 6 for SAP

Via RHSA-2011:1265 https://rhn.redhat.com/errata/RHSA-2011-1265.html
Comment 15 errata-xmlrpc 2013-10-23 12:57:57 EDT
This issue has been addressed in following products:

  Red Hat Network Satellite Server v 5.4

Via RHSA-2013:1455 https://rhn.redhat.com/errata/RHSA-2013-1455.html

Note You need to log in before you can comment on or make changes to this bug.