From 0ebb0e4643efc965e66a94ff0767cb274202fd17 Mon Sep 17 00:00:00 2001 From: John Helmert III Date: Thu, 15 Jul 2021 23:13:53 -0500 Subject: [ GLSA 202107-37 ] Apache Commons Collections: Remote code execution Signed-off-by: John Helmert III --- glsa-202107-37.xml | 53 +++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 53 insertions(+) create mode 100644 glsa-202107-37.xml diff --git a/glsa-202107-37.xml b/glsa-202107-37.xml new file mode 100644 index 00000000..649bc79d --- /dev/null +++ b/glsa-202107-37.xml @@ -0,0 +1,53 @@ + + + + Apache Commons Collections: Remote code execution + Apache Commons Collections unsafely deserializes untrusted input, + potentially resulting in arbitrary code execution. + + commons-collections + 2021-07-16 + 2021-07-16 + 739348 + remote + + + 3.2.2 + 3.2.2 + + + +

Apache Commons Collections extends the JCF classes with new interfaces, + implementations and utilities. +

+
+ +

Some classes in the Apache Commons Collections functor package + deserialized potentially untrusted input by default. +

+
+ +

Deserializing untrusted input using Apache Commons Collections could + result in remote code execution. +

+
+ +

There is no known workaround at this time.

+
+ +

All Apache Commons Collections users should upgrade to the latest + version: +

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-java/commons-collections-3.2.2" + +
+ + CVE-2017-15708 + + ajak + ajak +
-- cgit v1.2.3-65-gdbad