Author: tn
Date: Wed Nov 11 14:29:18 2015
New Revision: 1713850

URL: http://svn.apache.org/viewvc?rev=1713850&view=rev
Log:
Update Release Notes with details about improved fix for COLLECTIONS-580.

Modified:
    commons/proper/collections/branches/COLLECTIONS_3_2_X/RELEASE-NOTES.txt
    
commons/proper/collections/branches/COLLECTIONS_3_2_X/src/changes/changes.xml

Modified: 
commons/proper/collections/branches/COLLECTIONS_3_2_X/RELEASE-NOTES.txt
URL: 
http://svn.apache.org/viewvc/commons/proper/collections/branches/COLLECTIONS_3_2_X/RELEASE-NOTES.txt?rev=1713850&r1=1713849&r2=1713850&view=diff
==============================================================================
--- commons/proper/collections/branches/COLLECTIONS_3_2_X/RELEASE-NOTES.txt 
(original)
+++ commons/proper/collections/branches/COLLECTIONS_3_2_X/RELEASE-NOTES.txt Wed 
Nov 11 14:29:18 2015
@@ -12,8 +12,9 @@ This release is JDK1.3 compatible, and d
 This v3.2.2 release is a bugfix release, fixing several bugs present in the 
previous
 releases of the 3.2 branch. Additionally, this release provides a mitigation 
for a
 known remote code exploitation via the standard java object serialization 
mechanism.
-By default, de-serialization of "InvokerTransformer" instances is prohibited 
and
-will result in an exception. For more details, please refer to COLLECTIONS-580.
+By default, serialization support for unsafe classes in the functor package is
+disabled and will result in an exception when either trying to serialize or 
de-serialize
+an instance of these classes. For more details, please refer to 
COLLECTIONS-580.
 
 All users are strongly encouraged to updated to this release.
 
@@ -23,11 +24,14 @@ Changes in this version include:
 CHANGES
 =======
 
-o COLLECTIONS-580:  De-serialization of "InvokerTransformer" is disabled by 
default as this
-                    can be exploited for remote code execution attacks. To 
re-enable the
-                    feature the system property
-                    
"org.apache.commons.collections.invokertransformer.enableDeserialization"
-                    needs to be set to "true". 
+o COLLECTIONS-580:  Serialization support for unsafe classes in the functor 
package is
+                    disabled by default as this can be exploited for remote 
code execution
+                    attacks. To re-enable the feature the system property
+                    "org.apache.commons.collections.enableUnsafeSerialization" 
needs to be
+                    set to "true".
+                    Classes considered to be unsafe are: CloneTransformer, 
ForClosure,
+                    InstantiateFactory, InstantiateTransformer, 
InvokerTransformer,
+                    PrototypeCloneFactory, PrototypeSerializationFactory, 
WhileClosure.
 
 BUGFIXES
 ========

Modified: 
commons/proper/collections/branches/COLLECTIONS_3_2_X/src/changes/changes.xml
URL: 
http://svn.apache.org/viewvc/commons/proper/collections/branches/COLLECTIONS_3_2_X/src/changes/changes.xml?rev=1713850&r1=1713849&r2=1713850&view=diff
==============================================================================
--- 
commons/proper/collections/branches/COLLECTIONS_3_2_X/src/changes/changes.xml 
(original)
+++ 
commons/proper/collections/branches/COLLECTIONS_3_2_X/src/changes/changes.xml 
Wed Nov 11 14:29:18 2015
@@ -21,12 +21,15 @@
   </properties>
   <body>
 
-  <release version="3.2.2" date="20XX-XX-XX" description="This is a bugfix 
release.">
+  <release version="3.2.2" date="2015-11-18" description="This is a bugfix 
release.">
     <action issue="COLLECTIONS-580" dev="tn" type="update">
-      De-serialization of "InvokerTransformer" is disabled by default as this
-      can be exploited for remote code execution attacks. To re-enable the
-      feature the system property 
"org.apache.commons.collections.invokertransformer.enableDeserialization"
+      Serialization support for unsafe classes in the functor package is 
disabled
+      by default as this can be exploited for remote code execution attacks.
+      To re-enable the feature the system property 
"org.apache.commons.collections.enableUnsafeSerialization"
       needs to be set to "true".
+      Classes considered to be unsafe are: CloneTransformer, ForClosure, 
InstantiateFactory,
+      InstantiateTransformer, InvokerTransformer, PrototypeCloneFactory,
+      PrototypeSerializationFactory, WhileClosure.
     </action>
     <action issue="COLLECTIONS-538" dev="tn" type="fix" due-to="Trejkaz">
       "ExtendedProperties" will now use a privileged action to access the


Reply via email to