Synopsis: Important: jakarta-commons-collections security update Advisory ID: SLSA-2015:2521-1 Issue Date: 2015-11-30 CVE Numbers: CVE-2015-7501 -- It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons- collections library. (CVE-2015-7501) With this update, deserialization of certain classes in the commons- collections library is no longer allowed. Applications that require those classes to be deserialized can use the system property "org.apache.commons.collections.enableUnsafeSerialization" to re-enable their deserialization. In the interim, the quickest way to resolve this specific deserialization vulnerability is to remove the vulnerable class files (InvokerTransformer, InstantiateFactory, and InstantiateTransformer) in all commons-collections jar files. Any manual changes should be tested to avoid unforseen complications. All running applications using the commons-collections library must be restarted for the update to take effect. -- SL6 noarch jakarta-commons-collections-3.2.1-3.5.el6_7.noarch.rpm jakarta-commons-collections-javadoc-3.2.1-3.5.el6_7.noarch.rpm jakarta-commons-collections-testframework-3.2.1-3.5.el6_7.noarch.rpm jakarta-commons-collections-testframework-javadoc-3.2.1-3.5.el6_7.noarch.rpm jakarta-commons-collections-tomcat5-3.2.1-3.5.el6_7.noarch.rpm - Scientific Linux Development Team