Synopsis: Important: resteasy-base security and bug fix update Advisory ID: SLSA-2016:2604-2 Issue Date: 2016-11-03 CVE Numbers: CVE-2016-7050 -- Security Fix(es): * It was discovered that under certain conditions RESTEasy could be forced to parse a request with SerializableProvider, resulting in deserialization of potentially untrusted data. An attacker could possibly use this flaw to execute arbitrary code with the permissions of the application using RESTEasy. (CVE-2016-7050) Additional Changes: -- SL7 noarch resteasy-base-3.0.6-4.el7.noarch.rpm resteasy-base-atom-provider-3.0.6-4.el7.noarch.rpm resteasy-base-client-3.0.6-4.el7.noarch.rpm resteasy-base-jackson-provider-3.0.6-4.el7.noarch.rpm resteasy-base-javadoc-3.0.6-4.el7.noarch.rpm resteasy-base-jaxb-provider-3.0.6-4.el7.noarch.rpm resteasy-base-jaxrs-3.0.6-4.el7.noarch.rpm resteasy-base-jaxrs-all-3.0.6-4.el7.noarch.rpm resteasy-base-jaxrs-api-3.0.6-4.el7.noarch.rpm resteasy-base-jettison-provider-3.0.6-4.el7.noarch.rpm resteasy-base-providers-pom-3.0.6-4.el7.noarch.rpm resteasy-base-resteasy-pom-3.0.6-4.el7.noarch.rpm resteasy-base-tjws-3.0.6-4.el7.noarch.rpm - Scientific Linux Development Team