Update Release Notes with details about improved fix for COLLECTIONS-580.

git-svn-id: https://svn.apache.org/repos/asf/commons/proper/collections/branches/COLLECTIONS_3_2_X@1713850 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
Thomas Neidhart 2015-11-11 14:29:18 +00:00
parent d9a00134f1
commit 753354073b
2 changed files with 18 additions and 11 deletions

View File

@ -12,8 +12,9 @@ This release is JDK1.3 compatible, and does not use JDK1.5 generics.
This v3.2.2 release is a bugfix release, fixing several bugs present in the previous
releases of the 3.2 branch. Additionally, this release provides a mitigation for a
known remote code exploitation via the standard java object serialization mechanism.
By default, de-serialization of "InvokerTransformer" instances is prohibited and
will result in an exception. For more details, please refer to COLLECTIONS-580.
By default, serialization support for unsafe classes in the functor package is
disabled and will result in an exception when either trying to serialize or de-serialize
an instance of these classes. For more details, please refer to COLLECTIONS-580.
All users are strongly encouraged to updated to this release.
@ -23,11 +24,14 @@ Changes in this version include:
CHANGES
=======
o COLLECTIONS-580: De-serialization of "InvokerTransformer" is disabled by default as this
can be exploited for remote code execution attacks. To re-enable the
feature the system property
"org.apache.commons.collections.invokertransformer.enableDeserialization"
needs to be set to "true".
o COLLECTIONS-580: Serialization support for unsafe classes in the functor package is
disabled by default as this can be exploited for remote code execution
attacks. To re-enable the feature the system property
"org.apache.commons.collections.enableUnsafeSerialization" needs to be
set to "true".
Classes considered to be unsafe are: CloneTransformer, ForClosure,
InstantiateFactory, InstantiateTransformer, InvokerTransformer,
PrototypeCloneFactory, PrototypeSerializationFactory, WhileClosure.
BUGFIXES
========

View File

@ -21,12 +21,15 @@
</properties>
<body>
<release version="3.2.2" date="20XX-XX-XX" description="This is a bugfix release.">
<release version="3.2.2" date="2015-11-18" description="This is a bugfix release.">
<action issue="COLLECTIONS-580" dev="tn" type="update">
De-serialization of "InvokerTransformer" is disabled by default as this
can be exploited for remote code execution attacks. To re-enable the
feature the system property "org.apache.commons.collections.invokertransformer.enableDeserialization"
Serialization support for unsafe classes in the functor package is disabled
by default as this can be exploited for remote code execution attacks.
To re-enable the feature the system property "org.apache.commons.collections.enableUnsafeSerialization"
needs to be set to "true".
Classes considered to be unsafe are: CloneTransformer, ForClosure, InstantiateFactory,
InstantiateTransformer, InvokerTransformer, PrototypeCloneFactory,
PrototypeSerializationFactory, WhileClosure.
</action>
<action issue="COLLECTIONS-538" dev="tn" type="fix" due-to="Trejkaz">
"ExtendedProperties" will now use a privileged action to access the