Logo
Explore Help
Sign In
zzz/i2p.i2p
1
0
Fork 0
You've already forked i2p.i2p
forked from I2P_Developers/i2p.i2p
Code Issues Pull Requests Packages Projects Releases Wiki Activity
Files
13f910be70a4fdec837b3ff54b6c08bc7e5f83bf
i2p.i2p/apps/jetty
History
idk c4cfe420a6 disable any chance of JNDI lookups in log4j.properties file by setting %m{nolookups}. I don't think we're actually vulnerable to CVE-2021-44228 if I'm understanding correctly, by default it doesn't seem like we actually use log4j for much of anything and we don't do much logging of arbitrarily crafted remote inputs, but also it seems like this JNDI lookups thing is way more trouble than it could possibly be worth to us. Maybe it's a good idea to make sure it's turned off by default.
2021-12-10 21:01:37 -05:00
..
.externalToolBuilders
…
apache-tomcat-9.0.54
Tomcat 9.0.54
2021-10-11 10:46:26 -04:00
java/src/net/i2p
…
jetty-distribution-9.3.30.v20211001
…
patches/jetty-util/src/main/java/org/eclipse/jetty/util
…
resources
disable any chance of JNDI lookups in log4j.properties file by setting %m{nolookups}. I don't think we're actually vulnerable to CVE-2021-44228 if I'm understanding correctly, by default it doesn't seem like we actually use log4j for much of anything and we don't do much logging of arbitrarily crafted remote inputs, but also it seems like this JNDI lookups thing is way more trouble than it could possibly be worth to us. Maybe it's a good idea to make sure it's turned off by default.
2021-12-10 21:01:37 -05:00
build.gradle
…
build.xml
…
README-i2p.txt
…
Powered by Gitea Version: ca6c0de Page: 3045ms Template: 4ms
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API