{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":28618334,"defaultBranch":"master","name":"NppFTP","ownerLogin":"ashkulz","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2014-12-30T05:04:31.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/854352?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1710184559.0","currentOid":""},"activityList":{"items":[{"before":"2d07b24efd421d3305f1d5a21ef0bea3da86f94b","after":"9cdbc200095937cfa4b318c4e17172153f74157c","ref":"refs/heads/master","pushedAt":"2024-09-04T18:31:50.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"update to openssl 3.3.2","shortMessageHtmlLink":"update to openssl 3.3.2"}},{"before":"2ebf7b58d4add47dd82add2828654fa68a08120b","after":"2d07b24efd421d3305f1d5a21ef0bea3da86f94b","ref":"refs/heads/master","pushedAt":"2024-09-01T06:42:27.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"update to libssh 0.11.1\n\nChangelog:\n\n Fixed default TTY modes that are set when stdin is not connected to tty (#270)\n Fixed zlib cleanup procedure, which could crash on i386\n Various test fixes improving their stability\n Fixed cygwin build","shortMessageHtmlLink":"update to libssh 0.11.1"}},{"before":"d68f173045cc0127e2fc4bf727914615983e0aa5","after":"2ebf7b58d4add47dd82add2828654fa68a08120b","ref":"refs/heads/master","pushedAt":"2024-08-11T06:43:57.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"update to libssh 0.11.0 (#375)","shortMessageHtmlLink":"update to libssh 0.11.0 (#375)"}},{"before":"89242f4eb271f7cc56d972e6dbc970c6afe50694","after":"d68f173045cc0127e2fc4bf727914615983e0aa5","ref":"refs/heads/master","pushedAt":"2024-06-04T21:57:43.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"update openssl to 3.3.1\nwith\n### Changes between 3.3.0 and 3.3.1 [4 Jun 2024]\n\n * Fixed potential use after free after SSL_free_buffers() is called.\n\n The SSL_free_buffers function is used to free the internal OpenSSL\n buffer used when processing an incoming record from the network.\n The call is only expected to succeed if the buffer is not currently\n in use. However, two scenarios have been identified where the buffer\n is freed even when still in use.\n\n The first scenario occurs where a record header has been received\n from the network and processed by OpenSSL, but the full record body\n has not yet arrived. In this case calling SSL_free_buffers will succeed\n even though a record has only been partially processed and the buffer\n is still in use.\n\n The second scenario occurs where a full record containing application\n data has been received and processed by OpenSSL but the application has\n only read part of this data. Again a call to SSL_free_buffers will\n succeed even though the buffer is still in use.\n\n ([CVE-2024-4741])\n\n *Matt Caswell*\n\n * Fixed an issue where checking excessively long DSA keys or parameters may\n be very slow.\n\n Applications that use the functions EVP_PKEY_param_check() or\n EVP_PKEY_public_check() to check a DSA public key or DSA parameters may\n experience long delays. Where the key or parameters that are being checked\n have been obtained from an untrusted source this may lead to a Denial of\n Service.\n\n To resolve this issue DSA keys larger than OPENSSL_DSA_MAX_MODULUS_BITS\n will now fail the check immediately with a DSA_R_MODULUS_TOO_LARGE error\n reason.\n\n ([CVE-2024-4603])\n\n *Tomáš Mráz*","shortMessageHtmlLink":"update openssl to 3.3.1"}},{"before":"a9d77fa26a3d6136f14ed6559ef8779b566f9524","after":"89242f4eb271f7cc56d972e6dbc970c6afe50694","ref":"refs/heads/master","pushedAt":"2024-04-28T06:15:23.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"update to openssl 3.3.0 + adaptions for ssl session handling (#369)","shortMessageHtmlLink":"update to openssl 3.3.0 + adaptions for ssl session handling (#369)"}},{"before":"340e692fe71ada7aad8249d78b6954d640c3b269","after":null,"ref":"refs/heads/dependabot/github_actions/softprops/action-gh-release-2","pushedAt":"2024-03-11T19:15:59.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"}},{"before":"3f85fa04088c3e44fed2db1e56e3888ac119c71a","after":"a9d77fa26a3d6136f14ed6559ef8779b566f9524","ref":"refs/heads/master","pushedAt":"2024-03-11T19:15:51.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"Bump softprops/action-gh-release from 1 to 2 (#367)\n\nBumps [softprops/action-gh-release](https://github.com/softprops/action-gh-release) from 1 to 2.\r\n- [Release notes](https://github.com/softprops/action-gh-release/releases)\r\n- [Changelog](https://github.com/softprops/action-gh-release/blob/master/CHANGELOG.md)\r\n- [Commits](https://github.com/softprops/action-gh-release/compare/v1...v2)\r\n\r\n---\r\nupdated-dependencies:\r\n- dependency-name: softprops/action-gh-release\r\n dependency-type: direct:production\r\n update-type: version-update:semver-major\r\n...\r\n\r\nSigned-off-by: dependabot[bot] \r\nCo-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>","shortMessageHtmlLink":"Bump softprops/action-gh-release from 1 to 2 (#367)"}},{"before":null,"after":"340e692fe71ada7aad8249d78b6954d640c3b269","ref":"refs/heads/dependabot/github_actions/softprops/action-gh-release-2","pushedAt":"2024-03-11T00:29:27.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"},"commit":{"message":"Bump softprops/action-gh-release from 1 to 2\n\nBumps [softprops/action-gh-release](https://github.com/softprops/action-gh-release) from 1 to 2.\n- [Release notes](https://github.com/softprops/action-gh-release/releases)\n- [Changelog](https://github.com/softprops/action-gh-release/blob/master/CHANGELOG.md)\n- [Commits](https://github.com/softprops/action-gh-release/compare/v1...v2)\n\n---\nupdated-dependencies:\n- dependency-name: softprops/action-gh-release\n dependency-type: direct:production\n update-type: version-update:semver-major\n...\n\nSigned-off-by: dependabot[bot] ","shortMessageHtmlLink":"Bump softprops/action-gh-release from 1 to 2"}},{"before":"371e7b74f4860d3e12fa54fae9ee560a879d4c44","after":"3f85fa04088c3e44fed2db1e56e3888ac119c71a","ref":"refs/heads/master","pushedAt":"2024-01-31T06:25:19.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"bump version 0.30.19","shortMessageHtmlLink":"bump version 0.30.19"}},{"before":"fbb7de0ec422850d9ad65b93f4eee2c6b63f1468","after":"371e7b74f4860d3e12fa54fae9ee560a879d4c44","ref":"refs/heads/master","pushedAt":"2024-01-31T05:40:23.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"corrected sha1 hash for openssl 3.1.5","shortMessageHtmlLink":"corrected sha1 hash for openssl 3.1.5"}},{"before":"f7a13805bbdf2479e0c677eeed448ed3bbf14940","after":"fbb7de0ec422850d9ad65b93f4eee2c6b63f1468","ref":"refs/heads/master","pushedAt":"2024-01-31T05:38:21.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"update to openssl 3.1.5 with:\n\n### Changes between 3.1.4 and 3.1.5 [30 Jan 2024]\n\n * A file in PKCS12 format can contain certificates and keys and may come from\n an untrusted source. The PKCS12 specification allows certain fields to be\n NULL, but OpenSSL did not correctly check for this case. A fix has been\n applied to prevent a NULL pointer dereference that results in OpenSSL\n crashing. If an application processes PKCS12 files from an untrusted source\n using the OpenSSL APIs then that application will be vulnerable to this\n issue prior to this fix.\n\n OpenSSL APIs that were vulnerable to this are: PKCS12_parse(),\n PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()\n and PKCS12_newpass().\n\n We have also fixed a similar issue in SMIME_write_PKCS7(). However since this\n function is related to writing data we do not consider it security\n significant.\n\n ([CVE-2024-0727])\n\n *Matt Caswell*\n\n * When function EVP_PKEY_public_check() is called on RSA public keys,\n a computation is done to confirm that the RSA modulus, n, is composite.\n For valid RSA keys, n is a product of two or more large primes and this\n computation completes quickly. However, if n is an overly large prime,\n then this computation would take a long time.\n\n An application that calls EVP_PKEY_public_check() and supplies an RSA key\n obtained from an untrusted source could be vulnerable to a Denial of Service\n attack.\n\n The function EVP_PKEY_public_check() is not called from other OpenSSL\n functions however it is called from the OpenSSL pkey command line\n application. For that reason that application is also vulnerable if used\n with the \"-pubin\" and \"-check\" options on untrusted data.\n\n To resolve this issue RSA keys larger than OPENSSL_RSA_MAX_MODULUS_BITS will\n now fail the check immediately with an RSA_R_MODULUS_TOO_LARGE error reason.\n\n ([CVE-2023-6237])\n\n *Tomáš Mráz*\n\n * Restore the encoding of SM2 PrivateKeyInfo and SubjectPublicKeyInfo to\n have the contained AlgorithmIdentifier.algorithm set to id-ecPublicKey\n rather than SM2.\n\n *Richard Levitte*\n\n * The POLY1305 MAC (message authentication code) implementation in OpenSSL\n for PowerPC CPUs saves the contents of vector registers in different\n order than they are restored. Thus the contents of some of these vector\n registers is corrupted when returning to the caller. The vulnerable code is\n used only on newer PowerPC processors supporting the PowerISA 2.07\n instructions.\n\n The consequences of this kind of internal application state corruption can\n be various - from no consequences, if the calling application does not\n depend on the contents of non-volatile XMM registers at all, to the worst\n consequences, where the attacker could get complete control of the\n application process. However unless the compiler uses the vector registers\n for storing pointers, the most likely consequence, if any, would be an\n incorrect result of some application dependent calculations or a crash\n leading to a denial of service.\n\n ([CVE-2023-6129])\n\n *Rohan McLure*\n\n * Fix excessive time spent in DH check / generation with large Q parameter\n value.\n\n Applications that use the functions DH_generate_key() to generate an\n X9.42 DH key may experience long delays. Likewise, applications that use\n DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()\n to check an X9.42 DH key or X9.42 DH parameters may experience long delays.\n Where the key or parameters that are being checked have been obtained from\n an untrusted source this may lead to a Denial of Service.\n\n ([CVE-2023-5678])\n\n *Richard Levitte*","shortMessageHtmlLink":"update to openssl 3.1.5 with:"}},{"before":"2fd3fe45f8fad638588cb2c31a6575c1bb822a07","after":"255a8f0246977f6c1000ddc838d6e9364701a5e5","ref":"refs/heads/stable_v0_29","pushedAt":"2024-01-24T16:54:10.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"update to zlib 1.3.1","shortMessageHtmlLink":"update to zlib 1.3.1"}},{"before":"5c8e89af3b21f9e566a46c86e0c17da5b55b8a4c","after":"f7a13805bbdf2479e0c677eeed448ed3bbf14940","ref":"refs/heads/master","pushedAt":"2024-01-24T16:33:50.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"update to zlib 1.3.1","shortMessageHtmlLink":"update to zlib 1.3.1"}},{"before":"f00081e4db909a2e4d19df7d32cf19537daefeb0","after":"5c8e89af3b21f9e566a46c86e0c17da5b55b8a4c","ref":"refs/heads/master","pushedAt":"2023-12-19T21:40:45.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"- use python 3.12 for appveyor.yml\n- adapted further versions to 0.30.18","shortMessageHtmlLink":"- use python 3.12 for appveyor.yml"}},{"before":"deca29998ca628f2920c5ba34a35959961703c1e","after":"2fd3fe45f8fad638588cb2c31a6575c1bb822a07","ref":"refs/heads/stable_v0_29","pushedAt":"2023-12-19T21:36:01.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"bump version to 0.29.13","shortMessageHtmlLink":"bump version to 0.29.13"}},{"before":"d9b6bae2a5190fc04c13f48cb3c8440586547756","after":"deca29998ca628f2920c5ba34a35959961703c1e","ref":"refs/heads/stable_v0_29","pushedAt":"2023-12-19T21:23:01.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"update libssh 0.10.6\nbackported build changes from master","shortMessageHtmlLink":"update libssh 0.10.6"}},{"before":"69c5ad29501381c0fae3049792ae473209ac253d","after":"f00081e4db909a2e4d19df7d32cf19537daefeb0","ref":"refs/heads/master","pushedAt":"2023-12-19T20:59:02.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"bump version 0.30.18","shortMessageHtmlLink":"bump version 0.30.18"}},{"before":"016e426c7a7b4c84f35e46e3cfcd53080b9d8c05","after":"69c5ad29501381c0fae3049792ae473209ac253d","ref":"refs/heads/master","pushedAt":"2023-12-19T20:38:01.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"adapted iphlpapi linker fix for mingw builds","shortMessageHtmlLink":"adapted iphlpapi linker fix for mingw builds"}},{"before":"dbe2e1726c8ef6062cd543ee04d0793237e01086","after":"016e426c7a7b4c84f35e46e3cfcd53080b9d8c05","ref":"refs/heads/master","pushedAt":"2023-12-19T20:22:15.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"add missing dependency added with libssh 0.10.6 to\n\nssh.lib(misc.c.obj) : error LNK2019: unresolved external symbol _if_nametoindex@4 referenced in function _ssh_is_ipaddr [D:\\a\\NppFTP\\NppFTP\\_build\\NppFTP.vcxproj]\n\nhttps://learn.microsoft.com/de-de/windows/win32/api/netioapi/nf-netioapi-if_nametoindex\n, see https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=cea841d71c025f9c998b7d5fc9f2a2839df62921","shortMessageHtmlLink":"add missing dependency added with libssh 0.10.6 to"}},{"before":"4ffbdfe9ab6ff879c4acb0bf29cef417be734cf0","after":"dbe2e1726c8ef6062cd543ee04d0793237e01086","ref":"refs/heads/master","pushedAt":"2023-12-19T19:54:49.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"update libssh 0.10.6 with\nhttps://www.libssh.org/2023/12/18/libssh-0-10-6-and-libssh-0-9-8-security-releases/","shortMessageHtmlLink":"update libssh 0.10.6 with"}},{"before":"f32bc43a64f8606ed5a893cc6370b68b876c5096","after":null,"ref":"refs/heads/dependabot/github_actions/actions/upload-artifact-4","pushedAt":"2023-12-18T04:16:11.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"}},{"before":"e28538b0ac0fe610a7bee2dba30265f27704848d","after":"4ffbdfe9ab6ff879c4acb0bf29cef417be734cf0","ref":"refs/heads/master","pushedAt":"2023-12-18T04:16:03.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"Bump actions/upload-artifact from 3 to 4 (#366)\n\nBumps [actions/upload-artifact](https://github.com/actions/upload-artifact) from 3 to 4.\r\n- [Release notes](https://github.com/actions/upload-artifact/releases)\r\n- [Commits](https://github.com/actions/upload-artifact/compare/v3...v4)\r\n\r\n---\r\nupdated-dependencies:\r\n- dependency-name: actions/upload-artifact\r\n dependency-type: direct:production\r\n update-type: version-update:semver-major\r\n...\r\n\r\nSigned-off-by: dependabot[bot] \r\nCo-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>","shortMessageHtmlLink":"Bump actions/upload-artifact from 3 to 4 (#366)"}},{"before":null,"after":"f32bc43a64f8606ed5a893cc6370b68b876c5096","ref":"refs/heads/dependabot/github_actions/actions/upload-artifact-4","pushedAt":"2023-12-18T00:20:15.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"},"commit":{"message":"Bump actions/upload-artifact from 3 to 4\n\nBumps [actions/upload-artifact](https://github.com/actions/upload-artifact) from 3 to 4.\n- [Release notes](https://github.com/actions/upload-artifact/releases)\n- [Commits](https://github.com/actions/upload-artifact/compare/v3...v4)\n\n---\nupdated-dependencies:\n- dependency-name: actions/upload-artifact\n dependency-type: direct:production\n update-type: version-update:semver-major\n...\n\nSigned-off-by: dependabot[bot] ","shortMessageHtmlLink":"Bump actions/upload-artifact from 3 to 4"}},{"before":"69783d519593c43d2ae630ba07bb96641eeb8820","after":"e28538b0ac0fe610a7bee2dba30265f27704848d","ref":"refs/heads/master","pushedAt":"2023-11-21T07:28:54.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"Openssl 3.1.4 (#365)\n\n* - update openssl 3.1.4\r\n- fix issue on PASV LIST (to get to same state with remaining issue #265 as for openssl 1.1.1 )\r\n- avoid build failure on linux due to e.g.\r\nsrc/Encryption.cpp:135:103: error: ‘void DES_cfb64_encrypt(const unsigned char*, unsigned char*, long int, DES_key_schedule*, unsigned char (*)[8], int*, int)’ is deprecated: Since OpenSSL 3.0 [-Werror=deprecated-declarations]\r\n- fix cpack setup","shortMessageHtmlLink":"Openssl 3.1.4 (#365)"}},{"before":"809e6da17cd53df168ada49a408e977ff1cc0fcd","after":"69783d519593c43d2ae630ba07bb96641eeb8820","ref":"refs/heads/master","pushedAt":"2023-09-12T06:19:45.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"use fail-fast: false strategy for github CI actions","shortMessageHtmlLink":"use fail-fast: false strategy for github CI actions"}},{"before":"d64c5527509c098245cb4371203dc78355f133e9","after":"809e6da17cd53df168ada49a408e977ff1cc0fcd","ref":"refs/heads/master","pushedAt":"2023-09-12T05:37:27.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"bump version 0.30.17","shortMessageHtmlLink":"bump version 0.30.17"}},{"before":"0437f325045d19731928c68143149e5726b4c50c","after":"d64c5527509c098245cb4371203dc78355f133e9","ref":"refs/heads/master","pushedAt":"2023-09-12T05:23:35.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"update to openssl 1.1.1w\n\nChanges between 1.1.1v and 1.1.1w [11 Sep 2023]\n\n *) Fix POLY1305 MAC implementation corrupting XMM registers on Windows.\n\n The POLY1305 MAC (message authentication code) implementation in OpenSSL\n does not save the contents of non-volatile XMM registers on Windows 64\n platform when calculating the MAC of data larger than 64 bytes. Before\n returning to the caller all the XMM registers are set to zero rather than\n restoring their previous content. The vulnerable code is used only on newer\n x86_64 processors supporting the AVX512-IFMA instructions.\n\n The consequences of this kind of internal application state corruption can\n be various - from no consequences, if the calling application does not\n depend on the contents of non-volatile XMM registers at all, to the worst\n consequences, where the attacker could get complete control of the\n application process. However given the contents of the registers are just\n zeroized so the attacker cannot put arbitrary values inside, the most likely\n consequence, if any, would be an incorrect result of some application\n dependent calculations or a crash leading to a denial of service.\n\n (CVE-2023-4807)\n [Bernd Edlinger]","shortMessageHtmlLink":"update to openssl 1.1.1w"}},{"before":"a11d22c4a069f70a71c90753cd11f3f7ebf83b90","after":null,"ref":"refs/heads/dependabot/github_actions/actions/checkout-4","pushedAt":"2023-09-11T19:47:23.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"}},{"before":"ac390fb89837f1dab15b39f1d2ba343a1bbff794","after":"0437f325045d19731928c68143149e5726b4c50c","ref":"refs/heads/master","pushedAt":"2023-09-11T19:47:15.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"chcg","name":null,"path":"/chcg","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/12630740?s=80&v=4"},"commit":{"message":"Bump actions/checkout from 3 to 4 (#360)\n\nBumps [actions/checkout](https://github.com/actions/checkout) from 3 to 4.\r\n- [Release notes](https://github.com/actions/checkout/releases)\r\n- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)\r\n- [Commits](https://github.com/actions/checkout/compare/v3...v4)\r\n\r\n---\r\nupdated-dependencies:\r\n- dependency-name: actions/checkout\r\n dependency-type: direct:production\r\n update-type: version-update:semver-major\r\n...\r\n\r\nSigned-off-by: dependabot[bot] \r\nCo-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>","shortMessageHtmlLink":"Bump actions/checkout from 3 to 4 (#360)"}},{"before":null,"after":"a11d22c4a069f70a71c90753cd11f3f7ebf83b90","ref":"refs/heads/dependabot/github_actions/actions/checkout-4","pushedAt":"2023-09-11T01:16:13.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"dependabot[bot]","name":null,"path":"/apps/dependabot","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/29110?s=80&v=4"},"commit":{"message":"Bump actions/checkout from 3 to 4\n\nBumps [actions/checkout](https://github.com/actions/checkout) from 3 to 4.\n- [Release notes](https://github.com/actions/checkout/releases)\n- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)\n- [Commits](https://github.com/actions/checkout/compare/v3...v4)\n\n---\nupdated-dependencies:\n- dependency-name: actions/checkout\n dependency-type: direct:production\n update-type: version-update:semver-major\n...\n\nSigned-off-by: dependabot[bot] ","shortMessageHtmlLink":"Bump actions/checkout from 3 to 4"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAErQuc3wA","startCursor":null,"endCursor":null}},"title":"Activity · ashkulz/NppFTP"}