Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package log4j for openSUSE:Factory checked 
in at 2021-12-16 21:18:56
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/log4j (Old)
 and      /work/SRC/openSUSE:Factory/.log4j.new.2520 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "log4j"

Thu Dec 16 21:18:56 2021 rev:33 rq:940844 version:2.16.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/log4j/log4j.changes      2021-12-16 
02:01:13.363643417 +0100
+++ /work/SRC/openSUSE:Factory/.log4j.new.2520/log4j.changes    2021-12-16 
21:19:32.674526544 +0100
@@ -7,2 +7,4 @@
-    - Create module log4j-mongodb4 to use new major version 4 MongoDB driver.
-    - More flexible configuration of the Disruptor WaitStrategy. Thanks to 
Stepan Gorban.
+    - Create module log4j-mongodb4 to use new major version 4
+      MongoDB driver.
+    - More flexible configuration of the Disruptor WaitStrategy.
+      Thanks to Stepan Gorban.
@@ -11,10 +13,13 @@
-      Log4j 2.15.0 was incomplete in certain non-default configurations.
-      This could allows attackers with control over Thread Context Map (MDC)
-      input data when the logging configuration uses a Pattern Layout with
-      either a Context Lookup (for example, $${ctx:loginId}) or a Thread
-      Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data
-      using a JNDI Lookup pattern resulting in a denial of service (DOS) 
attack.
-      Log4j 2.15.0 restricts JNDI LDAP lookups to localhost by default.
-      Note that previous mitigations involving configuration such as setting 
the
-      system property log4j2.noFormatMsgLookup to true do NOT mitigate this
-      specific vulnerability.
+      Log4j 2.15.0 was incomplete in certain non-default
+      configurations.
+      This could allows attackers with control over Thread Context
+      Map (MDC) input data when the logging configuration uses a
+      Pattern Layout with either a Context Lookup (for example,
+      $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or
+      %MDC) to craft malicious input data using a JNDI Lookup
+      pattern resulting in a denial of service (DOS) attack.
+      Log4j 2.15.0 restricts JNDI LDAP lookups to localhost by
+      default. Note that previous mitigations involving
+      configuration such as setting the system property
+      log4j2.noFormatMsgLookup to true do NOT mitigate this specific
+      vulnerability.
@@ -23,3 +28,13 @@
-  * Drop CVE-2021-44228.patch included upstream
-  * To make the bots happy this stream isn't affected by bsc#1193662 
CVE-2021-4104 which is
-    1.X only
+  * Drop CVE-2021-44228.patch and disable-jndi-by-default.patch
+    included upstream
+  * To make the bots happy this stream isn't affected by
+    bsc#1193662 CVE-2021-4104 which is 1.X only
+
+-------------------------------------------------------------------
+Tue Dec 14 17:43:26 UTC 2021 - Peter Simons <[email protected]>
+
+- Apply "disable-jndi-by-default.patch" to disable JNDI support by
+  default. There is evidence that the previous upstream fix for
+  CVE-2021-44228 did not solve the vulnerability entirely. Since
+  JNDI support is ususally not required, upstream recommends this
+  route to be completely safe. [bsc#1193611, CVE-2021-44228]
@@ -125,0 +141 @@
+  * log4j-CVE-2020-9488.patch
@@ -127,0 +144,7 @@
+
+-------------------------------------------------------------------
+Mon Apr 27 11:21:57 UTC 2020 - Pedro Monreal Gonzalez 
<[email protected]>
+
+- Security fix: [bsc#1170535, CVE-2020-9488]
+  * Improper validation of certificate with host mismatch in SMTP appender.
+- Add log4j-CVE-2020-9488.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------

Reply via email to