Bug 17227 - apache-commons-collections new deserialization security issue fixed upstream in 3.2.2 (CVE-2015-7501)
Summary: apache-commons-collections new deserialization security issue fixed upstream ...
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 5
Hardware: i586 Linux
Priority: Normal critical
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL: http://lwn.net/Vulnerabilities/666320/
Whiteboard: advisory MGA5-64-OK
Keywords: validated_update
Depends on:
Blocks:
 
Reported: 2015-11-25 17:14 CET by David Walser
Modified: 2016-01-14 02:45 CET (History)
4 users (show)

See Also:
Source RPM: apache-commons-collections-3.2.1-24.mga5.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2015-11-25 17:14:35 CET
Debian has issued an advisory on November 24:
https://www.debian.org/security/2015/dsa-3403

This issue is explained further in this long oss-security thread:
http://openwall.com/lists/oss-security/2015/11/09/1

One useful link from that thread that explains the issue concisely is here:
https://blogs.apache.org/foundation/entry/apache_commons_statement_to_widespread

This issue will not be assigned a CVE, but applications that use this library in an unsafe manner could receive CVEs.

Mageia 5 is also affected.

Reproducible: 

Steps to Reproduce:
David Walser 2015-11-25 17:14:49 CET

CC: (none) => geiger.david68210
Whiteboard: (none) => MGA5TOO

David Walser 2015-11-25 20:03:55 CET

URL: (none) => http://lwn.net/Vulnerabilities/665805/

Comment 1 David Walser 2015-11-25 21:23:04 CET
apache-commons-collections-3.2.2-1.mga6 uploaded for Cauldron by David.

Version: Cauldron => 5
Whiteboard: MGA5TOO => (none)

Comment 2 David Walser 2015-12-01 21:20:23 CET
RedHat has issued an advisory for this on November 30:
https://rhn.redhat.com/errata/RHSA-2015-2522.html

Apparently, RedHat assigned the CVE themselves after MITRE declined to.

LWN reference for the CVE:
http://lwn.net/Vulnerabilities/666320/

Summary: apache-commons-collections new deserialization security issue fixed upstream in 3.2.2 => apache-commons-collections new deserialization security issue fixed upstream in 3.2.2 (CVE-2015-7501)

David Walser 2015-12-02 13:56:19 CET

URL: http://lwn.net/Vulnerabilities/665805/ => http://lwn.net/Vulnerabilities/666320/

Comment 3 David Walser 2016-01-12 18:41:50 CET
Patched package uploaded for Mageia 5.

Advisory:
========================

Updated apache-commons-collections packages fix security vulnerability:

It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library (CVE-2015-7501).

With this update, deserialization of certain classes in the
commons-collections library is no longer allowed. Applications that require
those classes to be deserialized can use the system property
"org.apache.commons.collections.enableUnsafeSerialization" to re-enable
their deserialization.

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7501
https://blogs.apache.org/foundation/entry/apache_commons_statement_to_widespread
https://rhn.redhat.com/errata/RHSA-2015-2522.html
========================

Updated packages in core/updates_testing:
========================
apache-commons-collections-3.2.1-24.1.mga5
apache-commons-collections-testframework-3.2.1-24.1.mga5
apache-commons-collections-javadoc-3.2.1-24.1.mga5
apache-commons-collections-testframework-javadoc-3.2.1-24.1.mga5

from apache-commons-collections-3.2.1-24.1.mga5.src.rpm

Assignee: mageia => qa-bugs
Severity: normal => critical

Dave Hodgins 2016-01-12 19:49:23 CET

CC: (none) => davidwhodgins
Whiteboard: (none) => advisory

Comment 4 Lewis Smith 2016-01-13 21:17:06 CET
Trying x64: apache-commons-collections-3.2.1-24.1.mga5
The update went smoothly. I stopped/re-started httpd. All valid local web accesses work fine.
For me this update is OK, but it does not touch the issue in question. Others please test.

CC: (none) => lewyssmith

Comment 5 David Walser 2016-01-13 21:18:25 CET
This has nothing to do with httpd.  As long as the update installs cleanly, you can OK it.
Comment 6 Dave Hodgins 2016-01-13 23:00:32 CET
Tried to figure out how to actually test it, with no luck, so going ahead
and validating it, as it does install cleanly.

Keywords: (none) => validated_update
Whiteboard: advisory => advisory MGA5-64-OK
CC: (none) => sysadmin-bugs

Comment 7 Mageia Robot 2016-01-14 02:45:20 CET
An update for this issue has been pushed to Mageia Updates repository.

http://advisories.mageia.org/MGASA-2016-0012.html

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.