can someone help me unsubscribe to this email group ? I have tried
manytimes , but not succeeded ?

-Mayank

On Tue, Dec 14, 2021 at 12:16 PM Dominik Psenner <dpsen...@gmail.com> wrote:

> This question has been asked several times now. I'm proposing to update the
> website so that it is more obvious that log4net and log4xx are not
> affected.
>
> On Tue, 14 Dec 2021 at 17:48, Matt Sicker <boa...@gmail.com> wrote:
>
> > JNDI is a Java API (Java Naming and Directory Interface) for abstracting
> > various networking APIs like LDAP, DNS, etc. It’s not present in .NET or
> > C++ (or any non-JVM language), so it does not affect log4net or log4cxx.
> > --
> > Matt Sicker
> >
> > > On Dec 14, 2021, at 08:54, David Schwartz <david.schwa...@ni.com>
> wrote:
> > >
> > > Hi Joe,
> > >
> > > Adding to what Davyd wrote.  I just searched the codebase and the
> > JndiLookup class (where the log4j vulnerability was found) does not exist
> > in log4net.  In fact, there is no code related to jndi at all as far as I
> > can see.
> > >
> > > David
> > >
> > > -----Original Message-----
> > > From: Davyd McColl <dav...@gmail.com <mailto:dav...@gmail.com>>
> > > Sent: Tuesday, December 14, 2021 4:10 PM
> > > To: dev@logging.apache.org <mailto:dev@logging.apache.org>
> > > Subject: [EXTERNAL] Re: log4net
> > >
> > > Hi Joe
> > >
> > > No, it shouldn't, particularly because we're very different projects,
> on
> > very different platforms, and I understand that the log4j vuln is largely
> > linked to a  _dependency_ of log4j. The closest we've had was an xml vuln
> > that was patched some time ago.
> > >
> > > That being said, I'm currently the only maintainer and I definitely
> have
> > written the least code in log4net, so if you or anyone else would like to
> > audit for vulnerabilities (and, even better, PR mitigations), I'm all for
> > it.
> > >
> > > -d
> > >
> > >
> > > On December 14, 2021 16:03:39 Joe Kelly <joe.ke...@okcu.org> wrote:
> > >
> > >> I was wondering if the log4net service has a similar vulnerability as
> > >> log4j. There isn't any information on the log4net security page and
> > >> the current version of 2.0.13 doesn't match the log4j version of
> 2.16.0.
> > >>
> > >> Joe Kelly
> > >> Information Security Analyst
> > >> P: 405.763.5425
> > >> F: 405.602.6337
> > >>
> https://urldefense.com/v3/__http://www.okcu.org__;!!FbZ0ZwI3Qg!6hdye55
> > <https://urldefense.com/v3/__http://www.okcu.org__;!!FbZ0ZwI3Qg!6hdye55>
> > >> e93GuHBF0X4qMKophICSr0Nb5ggI6RBgb2lJoysQv8jdWynWoouaTpixMWg$
> > >> <
> https://urldefense.com/v3/__https://www.okcu.org__;!!FbZ0ZwI3Qg!6hdye
> > <https://urldefense.com/v3/__https://www.okcu.org__;!!FbZ0ZwI3Qg!6hdye>
> > >> 55e93GuHBF0X4qMKophICSr0Nb5ggI6RBgb2lJoysQv8jdWynWoouYBYxYhmg$ >
> > >>
> > >> joe.ke...@okcu.org <mailto:joe.ke...@okcu.org> <mailto:
> > joe.ke...@okcu.org <mailto:joe.ke...@okcu.org>> Oklahoma's Credit Union
> > >> Happy to Help(r)
> > >>
> > >>
> > >>
> > >>
> > >>
> > >> ________________________________
> > >>
> > >> NOTICE:
> > >> This e-mail is intended solely for the use of the individual to whom
> > >> it is addressed and may contain information that is privileged,
> > >> confidential or otherwise exempt from disclosure. If the reader of
> > >> this e-mail is not the intended recipient or the employee or agent
> > >> responsible for delivering the message to the intended recipient, you
> > >> are hereby notified that any dissemination, distribution, or copying
> > >> of this communication is strictly prohibited. If you have received
> > >> this communication in error, please immediately notify us by replying
> > >> to the original message at the listed email address.
> > >>
> > >> Happy to Help
> > >> Oklahoma's Credit Union
> > >>
> https://urldefense.com/v3/__http://www.okcu.org__;!!FbZ0ZwI3Qg!6hdye55
> > <https://urldefense.com/v3/__http://www.okcu.org__;!!FbZ0ZwI3Qg!6hdye55>
> > >> e93GuHBF0X4qMKophICSr0Nb5ggI6RBgb2lJoysQv8jdWynWoouaTpixMWg$
> > >
> > > INTERNAL - NI CONFIDENTIAL
> >
> >
>
> --
> Dominik Psenner
>


-- 
Regards
Mayank

Reply via email to