Synopsis:          Important: resteasy-base security and bug fix update
Advisory ID:       SLSA-2016:2604-2
Issue Date:        2016-11-03
CVE Numbers:       CVE-2016-7050
--

Security Fix(es):

* It was discovered that under certain conditions RESTEasy could be forced
to parse a request with SerializableProvider, resulting in deserialization
of potentially untrusted data. An attacker could possibly use this flaw to
execute arbitrary code with the permissions of the application using
RESTEasy. (CVE-2016-7050)

Additional Changes:
--

SL7
  noarch
    resteasy-base-3.0.6-4.el7.noarch.rpm
    resteasy-base-atom-provider-3.0.6-4.el7.noarch.rpm
    resteasy-base-client-3.0.6-4.el7.noarch.rpm
    resteasy-base-jackson-provider-3.0.6-4.el7.noarch.rpm
    resteasy-base-javadoc-3.0.6-4.el7.noarch.rpm
    resteasy-base-jaxb-provider-3.0.6-4.el7.noarch.rpm
    resteasy-base-jaxrs-3.0.6-4.el7.noarch.rpm
    resteasy-base-jaxrs-all-3.0.6-4.el7.noarch.rpm
    resteasy-base-jaxrs-api-3.0.6-4.el7.noarch.rpm
    resteasy-base-jettison-provider-3.0.6-4.el7.noarch.rpm
    resteasy-base-providers-pom-3.0.6-4.el7.noarch.rpm
    resteasy-base-resteasy-pom-3.0.6-4.el7.noarch.rpm
    resteasy-base-tjws-3.0.6-4.el7.noarch.rpm

- Scientific Linux Development Team