Skip to content

Releases: apache/logging-log4net

2.0.17

15 Mar 12:11
Compare
Choose a tag to compare

2.0.16

2.0.15

25 Jul 07:44
Compare
Choose a tag to compare

Attention: .NET 3.5 Client Profile is no longer supported. I'm really sorry, I've tried to keep as many of the legacy targets available as possible, but after spending another 4 or so hours trying to get net35-client to build on any machine, I've given up - as far as I'm aware, this should only affect Windows XP clients. I'm afraid 2.0.14 was the end of the road for you. Apache log4net 2.0.15 addresses reported issues:

Bug fixes

  • Improper usage of xml namespacing for netfx targets after a netstandard update ( LOG4NET-685, related LOG4NET-683)
  • Locking hashtables during write in RenderMap calls to make them thread-safe ( LOG4NET-646)
  • An issue where RollingFilAppender would sometimes overwrite files instead of rolling them ( LOG4NET-672)

Enhancements

2.0.14

16 Dec 08:29
Compare
Choose a tag to compare

2.0.13

28 Oct 07:46
Compare
Choose a tag to compare

Some minor updates:

This is essentially the same release as rc-1, with the artifacts updated so that unzipping them won't scatter files in the target.

2.0.13 (RC1)

25 Oct 14:27
Compare
Choose a tag to compare
2.0.13 (RC1) Pre-release
Pre-release

Some minor updates:

Fixes LOG4NET-(652|653)

18 Oct 15:28
Compare
Choose a tag to compare

Should resolve issues with PlatformNotSupported exceptions raised on !win32 when attempting to include the current user name in logs.

Correct assembly versions

18 Sep 12:10
Compare
Choose a tag to compare
  • corrects assembly versioning still reported as 2.0.9 in the 2.0.10 release
  • ensures that stream writers used during log flushing are properly disposed
  • corrects version strings for client profile assemblies

Address CVE-2018-1285 and improve netstandard 2.0 support

06 Sep 18:47
Compare
Choose a tag to compare

Apache log4net 2.0.10 improves netstandard2.0 support thanks to community member @NicholasNoise.

Bug Fixes

  • [LOG4NET-575] Addresses CVE-2018-1285 by cherry-picking the fix from Dominik Psenner, reported by Karthik Balasundaram, as it already existed in the the develop branch