PortraitBuilder
PortraitBuilder copied to clipboard
[Security] Bump log4net from 2.0.8 to 2.0.12
Bumps log4net from 2.0.8 to 2.0.12.
Release notes
Sourced from log4net's releases.
Fixes LOG4NET-(652|653)
Should resolve issues with
PlatformNotSupportedexceptions raised on !win32 when attempting to include the current user name in logs.Correct assembly versions
- corrects assembly versioning still reported as 2.0.9 in the 2.0.10 release
- ensures that stream writers used during log flushing are properly disposed
- corrects version strings for client profile assemblies
Address CVE-2018-1285 and improve netstandard 2.0 support
Apache log4net 2.0.10 improves netstandard2.0 support thanks to community member @NicholasNoise.
Bug Fixes
- [LOG4NET-575] Addresses CVE-2018-1285 by cherry-picking the fix from Dominik Psenner, reported by Karthik Balasundaram, as it already existed in the the develop branch
Commits
47aaf46:bookmark: bump version to 2.0.12, fixes LOG4NET-(652|653)bf81ef2:bookmark: update versioning to 2.0.12.0e137855:bug: should fall back on Environment.UserName if !win32141b00b:tada: build-xplatform works; now to get tests running...9e3b1d1:memo: add documentation about building with docker31c577e:ambulance: retroactively fix up site source doap filefa0cd5b:construction: let's get this building a subset x-platform so we can test x-p...1a1f9fa:bug: should not fail when platform does not support fetching windows user name525526b:art: sort modifiers with default .net style sortingd5cb207:memo: add documentation about proposed 2.0.11 release- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)@dependabot use these labelswill set the current labels as the default for future PRs for this repo and language@dependabot use these reviewerswill set the current reviewers as the default for future PRs for this repo and language@dependabot use these assigneeswill set the current assignees as the default for future PRs for this repo and language@dependabot use this milestonewill set the current milestone as the default for future PRs for this repo and language@dependabot badge mewill comment on this PR with code to add a "Dependabot enabled" badge to your readme
Additionally, you can set the following in your Dependabot dashboard:
- Update frequency (including time of day and day of week)
- Pull request limits (per update run and/or open at any time)
- Out-of-range updates (receive only lockfile updates, if desired)
- Security updates (receive only security updates, if desired)
We've just been alerted that this update fixes a security vulnerability:
Sourced from The GitHub Security Advisory Database.
XML External Entity attack in log4net
Apache log4net before 2.0.10 does not disable XML external entities when parsing log4net configuration files. This could allow for XXE-based attacks in applications that accept arbitrary configuration files from users.
Affected versions: ["< 2.0.10"]