CentOS Errata and Security Advisory CESA-2015:2671
The Jakarta/Apache Commons Collections library provides new interfaces,
implementations, and utilities to extend the features of the Java
Collections Framework.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
With this update, deserialization of certain classes in the
commons-collections library is no longer allowed. Applications that require
those classes to be deserialized can use the system property
โorg.apache.commons.collections.enableUnsafeSerializationโ to re-enable
their deserialization.
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of jakarta-commons-collections are advised to upgrade to these
updated packages, which contain a backported patch to correct this issue.
All running applications using the commons-collections library must be
restarted for the update to take effect.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2015-December/083720.html
Affected packages:
jakarta-commons-collections
jakarta-commons-collections-javadoc
jakarta-commons-collections-testframework
jakarta-commons-collections-testframework-javadoc
jakarta-commons-collections-tomcat5
Upstream details at:
https://access.redhat.com/errata/RHSA-2015:2671