jakarta security update

ID CESA-2015:2671
Type centos
Reporter CentOS Project
Modified 2015-12-21T11:17:35


CentOS Errata and Security Advisory CESA-2015:2671

The Jakarta/Apache Commons Collections library provides new interfaces, implementations, and utilities to extend the features of the Java Collections Framework.

It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library. (CVE-2015-7501)

With this update, deserialization of certain classes in the commons-collections library is no longer allowed. Applications that require those classes to be deserialized can use the system property "org.apache.commons.collections.enableUnsafeSerialization" to re-enable their deserialization.

Further information about this security flaw may be found at: https://access.redhat.com/solutions/2045023

All users of jakarta-commons-collections are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. All running applications using the commons-collections library must be restarted for the update to take effect.

Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2015-December/033596.html

Affected packages: jakarta-commons-collections jakarta-commons-collections-javadoc jakarta-commons-collections-testframework jakarta-commons-collections-testframework-javadoc jakarta-commons-collections-tomcat5

Upstream details at: https://rhn.redhat.com/errata/RHSA-2015-2671.html