{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":10567891,"defaultBranch":"master","name":"frestq","ownerLogin":"sequentech","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2013-06-08T11:45:09.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/86040603?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1726011281.0","currentOid":""},"activityList":{"items":[{"before":"f4c33ad0579768a91d6bc2ddc5efedc06ad15c11","after":"97fc30447f8e46a1414064378934f6bb22d470aa","ref":"refs/heads/10.5.x","pushedAt":"2024-09-10T23:34:40.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"Findeton","name":"Fรฉlix Robles","path":"/Findeton","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/3913223?s=80&v=4"},"commit":{"message":"Release for version 10.5.1","shortMessageHtmlLink":"Release for version 10.5.1"}},{"before":null,"after":"f4c33ad0579768a91d6bc2ddc5efedc06ad15c11","ref":"refs/heads/10.5.x","pushedAt":"2024-08-17T01:46:01.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"edulix","name":"Eduardo Robles","path":"/edulix","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/81968?s=80&v=4"},"commit":{"message":"Release for version 10.5.0","shortMessageHtmlLink":"Release for version 10.5.0"}},{"before":null,"after":"3a04db2691ecce0699e3bfbda28f75f75d19e928","ref":"refs/heads/dependabot/pip/requests-2.32.0","pushedAt":"2024-05-21T05:46:34.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"},"commit":{"message":"---\nupdated-dependencies:\n- dependency-name: requests\n dependency-type: direct:production\n...\n\nSigned-off-by: dependabot[bot] Sourced from cryptography's\r\nchangelog. 42.0.4 - 2024-02-20 .. _v42-0-3: 42.0.3 - 2024-02-15\r\nChangelog
\r\n\r\n
\r\n* Fixed a null-pointer-dereference and segfault that could occur when\r\ncreating\r\na PKCS#12 bundle. Credit to **Alexander-Programming** for reporting the\r\n issue. **CVE-2024-26130**\r\n* Fixed ASN.1 encoding for PKCS7/SMIME signed messages. The fields\r\n``SMIMECapabilities``\r\nand ``SignatureAlgorithmIdentifier`` should now be correctly encoded\r\naccording to the\r\n definitions in :rfc:`2633` :rfc:`3370`.\r\n
.. _v42-0-2:
\r\n\r\n\r\nfe18470
\r\nBump for 42.0.4 release (#10445)aaa2dd0
\r\nFix ASN.1 issues in PKCS#7 and S/MIME signing (#10373)\r\n(#10442)7a4d012
\r\nFixes #10422\r\n-- don't crash when a PKCS#12 key and cert don't match (#10423)\r\n...df314bb
\r\nbackport actions m1 switch to 42.0.x (#10415)c49a7a5
\r\nchangelog and version bump for 42.0.3 (#10396)396bcf6
\r\nfix provider loading take two (#10390)\r\n(#10395)0e0e46f
\r\nbackport: initialize openssl's legacy provider in rust (#10323)\r\n(#10333)Sourced from cryptography's\r\nchangelog.
\r\n\r\n\r\n42.0.4 - 2024-02-20
\r\n\r\n\r\n* Fixed a null-pointer-dereference and segfault that could occur when\r\ncreating\r\na PKCS#12 bundle. Credit to **Alexander-Programming** for reporting the\r\n issue. **CVE-2024-26130**\r\n* Fixed ASN.1 encoding for PKCS7/SMIME signed messages. The fields\r\n``SMIMECapabilities``\r\nand ``SignatureAlgorithmIdentifier`` should now be correctly encoded\r\naccording to the\r\n definitions in :rfc:`2633` :rfc:`3370`.\r\n
.. _v42-0-3:
\r\n42.0.3 - 2024-02-15\r\n
\r\n
\r\n- Fixed an initialization issue that caused key loading failures for\r\nsome\r\nusers.
\r\n.. _v42-0-2:
\r\n
fe18470
\r\nBump for 42.0.4 release (#10445)aaa2dd0
\r\nFix ASN.1 issues in PKCS#7 and S/MIME signing (#10373)\r\n(#10442)7a4d012
\r\nFixes #10422\r\n-- don't crash when a PKCS#12 key and cert don't match (#10423)\r\n...df314bb
\r\nbackport actions m1 switch to 42.0.x (#10415)c49a7a5
\r\nchangelog and version bump for 42.0.3 (#10396)396bcf6
\r\nfix provider loading take two (#10390)\r\n(#10395)0e0e46f
\r\nbackport: initialize openssl's legacy provider in rust (#10323)\r\n(#10333)Sourced from cryptography's\r\nchangelog.
\r\n\r\n\r\n42.0.4 - 2024-02-20
\r\n\r\n\r\n* Fixed a null-pointer-dereference and segfault that could occur when\r\ncreating\r\na PKCS#12 bundle. Credit to **Alexander-Programming** for reporting the\r\n issue. **CVE-2024-26130**\r\n* Fixed ASN.1 encoding for PKCS7/SMIME signed messages. The fields\r\n``SMIMECapabilities``\r\nand ``SignatureAlgorithmIdentifier`` should now be correctly encoded\r\naccording to the\r\n definitions in :rfc:`2633` :rfc:`3370`.\r\n
.. _v42-0-3:
\r\n42.0.3 - 2024-02-15\r\n
\r\n
\r\n- Fixed an initialization issue that caused key loading failures for\r\nsome\r\nusers.
\r\n.. _v42-0-2:
\r\n
fe18470
\r\nBump for 42.0.4 release (#10445)aaa2dd0
\r\nFix ASN.1 issues in PKCS#7 and S/MIME signing (#10373)\r\n(#10442)7a4d012
\r\nFixes #10422\r\n-- don't crash when a PKCS#12 key and cert don't match (#10423)\r\n...df314bb
\r\nbackport actions m1 switch to 42.0.x (#10415)c49a7a5
\r\nchangelog and version bump for 42.0.3 (#10396)396bcf6
\r\nfix provider loading take two (#10390)\r\n(#10395)0e0e46f
\r\nbackport: initialize openssl's legacy provider in rust (#10323)\r\n(#10333)