logback-access-1.2.11-150200.3.10.1<>,2g5p9|ӥT_)i(PTO"7^D,Fav uŏ|O* B=[4X+dڱ;%8Ɗ-Z>;UQdU uz7RhՋ>z2I X\1䘰]%39`<)K{l0d8Wnj6Jx_x_|@u*o0p?V: zݴUg +|]f&J1gtQB;~z:n6+*>>?d & T $04Mn     ( / 8TwTp(B8L 9p : FGHI4X<YL\x]^bcUdefluvwxyz(8<BClogback-access1.2.11150200.3.10.1Logback-access module for Servlet integrationThe logback-access module integrates with Servlet containers, such as Tomcat and Jetty, to provide HTTP-access log functionality. Note that you could easily build your own module on top of logback-core.g5h01-ch2dSUSE Linux Enterprise 15SUSE LLC EPL-1.0 OR LGPL-2.1-or-laterhttps://www.suse.com/Unspecifiedhttps://logback.qos.ch/linuxnoarcheA큤A큤A큤g5g5g5b#g5g5g553c5353f1cab6844ecfd0b4e164ec0b33b6012850d92aa2f9c506315c1e0899e94a99c6ee7e8b5ba3ef66a1d234c22a55c149e93584040d66a7f6694d552e7eaef6652c06e882a2f617d464cba6f4fecc56a730e4ef4e00fc1eed535fdc3e887cd0f37be71ba79ff7f17ae840f88e35be2996867dd0c50a15f8c42ee4d8995b0rootrootrootrootrootrootrootrootrootrootrootrootrootrootlogback-1.2.11-150200.3.10.1.src.rpmlogback-accessmvn(ch.qos.logback:logback-access)mvn(ch.qos.logback:logback-access:pom:)osgi(ch.qos.logback.access)@ @@    java-headlessjavapackages-filesystemmvn(ch.qos.logback:logback-core)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1.81.2.113.0.4-14.6.0-14.0-15.2-14.14.1g~hed^@bjb@a{a*@]@]6@gus.kenion@suse.comgus.kenion@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.comfstrba@suse.com- CVE-2024-12798 (bsc#1234742) Arbitrary code execution via JaninoEventEvaluator * Resolution: remove JaninoEventEvaluator - CVE-2024-12801 (bsc#1234743) Server-Side Request Forgery (SSRF) in SaxEventRecorder * Resolution: prevent Server-Side Request Forgery (SSRF) attacks by ignoring external DTD files in DOCTYPE * Remove SaxEventRecorder - Add logback-CVE-2024-12801-CVE-2024-12798.patch- Use %patch -P N instead of deprecated %patchN.- Reproducible builds: use SOURCE_DATE_EPOCH for timestamp- Upgrade to upstream version 1.2.11 * Backported fix for LOGBACK-1027. * Fixed incorrect String cast in JNDIUtil. This corrects LOGBACK-1604. * In SMTPAppenderBase empty username parameter is now treated the same way as null. This fixes LOGBACK-1594. * ContextInitializer no longer complains about missing logback.groovy configuration file. This fixes LOGBACK-1601. * In response to CVE-2021-42550 (aka LOGBACK-1591) the following steps were made: 1) Hardened logback's JNDI lookup mechanism to only honor requests in the java: namespace. All other types of requests are ignored. 2) SMTPAppender was hardened. 3) Temporarily removed DB support for security reasons. 4) Removed Groovy configuration support. As logging is so pervasive and configuration with Groovy is probably too powerful, this feature is unlikely to be reinstated for security reasons. The aforementioned vulnerability requires write access to logback's configuration file as a prerequisite. A successul RCE attack with CVE-2021-42550 requires all of the following conditions to be met: + write access to logback.xml + use of versions < 1.2.9 + reloading of poisoned configuration data, which implies application restart or scan="true" set prior to attack - Set project.build.sourceEncoding property to ISO-8859-1 to avoid the new maven-resources-plugin chocking on trying to filter in UTF-8 encoding JKS (binary) resources- Do not build against the log4j12 packages- Do not execute goals generateTestStubs and compileTests of gmavenplus-plugin, since we are not compiling or runnig tests during the rpm build. This also allows us to use a wider range of gmavenplus-plugin versions, since those executions changed names in 1.6.- Upgrade to version 1.2.8 (bsc#1193795) * Changes of version 1.2.8 + In response to LOGBACK-1591, all JNDI lookup code in logback has been disabled until further notice. This impacts ContextJNDISelector and element in configuration files. + Also in response to LOGBACK-1591, all database (JDBC) related code in the project has been removed with no replacement. + Note that the vulnerability mentioned in LOGBACK-1591 requires write access to logback's configuration file as a prerequisite. The log4Shell/CVE-2021-44228 and LOGBACK-1591 are of different severity levels. A successful RCE requires all of the following conditions to be met: - write access to logback.xml - use of versions < 1.2.8 - reloading of poisoned configuration data, which implies application restart or scan="true" set prior to attack + As an additional extra precaution, in addition to upgrading to logback version 1.2.8, the users are advised to set their logback configuration files as read-only. * Changes of version 1.2.7 + Added hostnameVerification to property SSLSocketAppender. This fixes LOGBACK-1574. * Changes of version 1.2.6 + To prevent XML eXternal Entity injection (XXE) attacks, Joran no longer reads external entities passed in XML files. This fixes LOGBACK-1465. * Changes of version 1.2.5 + Instead of an Appender, the LayoutWrappingEncoder now accepts a variable of type ContextAware as a parent. This fixes LOGBACK-1326. * Changes of version 1.2.4 + Added support for minimum length in %i filename pattern. This fixes LOGBACK-1248. + For size bound log file archiving, allow TimeBasedArchiveRemove to remove files with indexes containing upto 5 digits. This fixes LOGBACK-1175. + Added %prefix composite converter which automatically prefixes child converter output with the name of the converter. This feature is quite handy in environments where log files need to be parsed and monitored. - Changed patch: * logback-1.1.11-jetty.patch -> logback-1.2.8-jetty.patch + Rediff to changed context- Do not force building with java < 9 - Specify maven.compiler.release=8 to access the java.util.function.Supplier API, introduced in java 8 - Added patch: * logback-1.2.3-getCallerClass.patch + Access the sun.reflect.Reflection.getCallerClass by reflection, in order to be able to build with jdk >= 9- Initial packaging of logback 1.2.3h01-ch2d 17365211631.2.11-150200.3.10.11.2.111.2.111.2.11logbacklogback-access.jarlogback-accessLICENSE.txtlogback-access.xmllogbacklogback-access.pom/usr/share/java//usr/share/java/logback//usr/share/licenses//usr/share/licenses/logback-access//usr/share/maven-metadata//usr/share/maven-poms//usr/share/maven-poms/logback/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:36966/SUSE_SLE-15-SP2_Update/9207f77962a89a1bad54b203fe4f1da0-logback.SUSE_SLE-15-SP2_Updatedrpmxz5noarch-suse-linuxdirectoryASCII text, with CRLF line terminators (Zip archive data, at least v2.0 to extract Zip archive data, at least v2.0 to extract)ASCII textXML 1.0 document, ASCII textXML 1.0 document textPPPRRRז0%>Nutf-8d521699ca567e03e0f77065e50c6670f0250ce0ced424317a59b97a470a72326? 7zXZ !t/~]"k%20+0~}:]]c `&&;Q@^ d*۲S~ (uZHm$;(k:/~wx8LCV+LthjN ,Zyll w0l8b oCqba^?^sW )?첫h$$ќ/ŤhyK|}Mm/l斲7.dqgg^AX cݮ^cYt<9Ȍ|NZLL!|ZQ'LkǥpM|~yܓX qnW=D5TeLl0GSy^pO}\aʈײG NϗirBy׫]$ o`wAoZb^N(3UӮفS"(g+ܶ!qYq-LQ0CÉs֊~rd@e~8٫LN0RxF^4WLAR7g7*|$_ӗҐn (RRkn爹&UMid26cZ$/_Z'[r79{Te$'i{qy GSD]jƤivVj7ٟ1?^xeS'vB~ԙuK) ݉&0\}+"3b:iOo!*odX],N"/dmZKn^Ӷp6^NبFl|֨7`{UT'6yn EZ Upȶ^@U{ ji7>:r\IÜ'>DEOwзgigW} -V`p? U5s,]tebih՝`qTwp]˜ު: $eF!Q2NA.uӻx󲎝EyaZ>0+L{dhbFDnl}jgnEK;/BH=d{r"MaF~o ٵܹvR>1KwaEFf"2 %8%;)A#h*>ӨUڰt/#kM?E/1.RQ ,\JzzbOGf<1ܰj NbT?ƷBρdyiƪiSzyj>#(Z]z3nk svu(=k}{6X0߾Ueg={5\,"nƯ~g%mG7E yYW VޯX&[SEztK;=Ĝ;"f$_9YRzY? u5Ӑ| DNdm.VeF7RJn hp8uWJƧW1DAy Kn :ң{ {'ڃ)q|_3ꂈq<g|29ׯֳܘKG$z_dǾH n8z %=f=+=Gii0L`(dSVIl^$QwX`!uvg@(l 0䐘;Vm2R<-Pv%mN0!Vx>h2Gą)zY9k MTL5[Y!dQW|kp ]eI^m}FkX۝j/e*o/ΓM,N,UPQlEEsOO*ǺCгjnY6q""&7OU6ӇKH޷w?Biy#`q(DRaWIR{iD VwX ,85SF'bkD#B"Y-Jmv FD~-C#_":YtMu䭌uٞƄZ[=p&+bxA y81Mi5p q,[-t[Qd.X yjp'oD~dsV:y86/P_13I C9SP5SjCKXkE<+\_$ QGڼim_ }a؛ܞϨ \;T=qQSMu)㨤6QsؕuU8,A+8?O1J$zl%i [Mf"x@'miڑ\ [j`| uqs{>Ue]h UQ>4꩸W6uJbWTU6e&n5aߤHޕ𮋷 3 BJx3:b쎊r@jDv5q 86o$pg=r~eTNƐjEmb Jtu_'y%v .GrKl7QCAMIvμ6WRHN/- n=xb TԽ{XA0݈ҷ?*kaM_Ћ¸Ώ ΧV̡e^iQ|uN*&! `o?cPh*П4Zй^4m|LER[E鰢#];X*pAoM4ID2uyUȴQv"Aj-XIOw^ jnK6$]Sk2'w 'w)Z }ڰl4 A#u |"r_俳OxOqLZγ"o2h4Tě?'r! %UV.Q546Ei(EP~ti c]نS/n:+$7 iBy4GͬeS @1)Z? aOd!%3JRPޥ%Mc9U NಪFH ov4U˳f\mƶ YZ