resteasy-base (SL7)

Synopsis: Important: resteasy-base security and bug fix update
Advisory ID: SLSA-2016:2604-2
Issue Date: 2016-11-03
CVE Numbers: CVE-2016-7050

Security Fix(es):

* It was discovered that under certain conditions RESTEasy could be forced
to parse a request with SerializableProvider, resulting in deserialization
of potentially untrusted data. An attacker could possibly use this flaw to
execute arbitrary code with the permissions of the application using
RESTEasy. (CVE-2016-7050)

Additional Changes:

SL7
noarch
resteasy-base-3.0.6-4.el7.noarch.rpm
resteasy-base-atom-provider-3.0.6-4.el7.noarch.rpm
resteasy-base-client-3.0.6-4.el7.noarch.rpm
resteasy-base-jackson-provider-3.0.6-4.el7.noarch.rpm
resteasy-base-javadoc-3.0.6-4.el7.noarch.rpm
resteasy-base-jaxb-provider-3.0.6-4.el7.noarch.rpm
resteasy-base-jaxrs-3.0.6-4.el7.noarch.rpm
resteasy-base-jaxrs-all-3.0.6-4.el7.noarch.rpm
resteasy-base-jaxrs-api-3.0.6-4.el7.noarch.rpm
resteasy-base-jettison-provider-3.0.6-4.el7.noarch.rpm
resteasy-base-providers-pom-3.0.6-4.el7.noarch.rpm
resteasy-base-resteasy-pom-3.0.6-4.el7.noarch.rpm
resteasy-base-tjws-3.0.6-4.el7.noarch.rpm

– Scientific Linux Development Team