Skip to content

Commit 73d7cf0

Browse files
committed
release 2.3
Signed-off-by: Michał Trojnara <[email protected]>
1 parent 7affd85 commit 73d7cf0

File tree

3 files changed

+18
-9
lines changed

3 files changed

+18
-9
lines changed

INSTALL.W32.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
cd osslsigncode-folder
1515
x86_64-w64-mingw32-gcc osslsigncode.c msi.c msi.h -o osslsigncode.exe \
1616
-lcrypto -lssl -lcurl \
17-
-D 'PACKAGE_STRING="osslsigncode 2.2"' \
17+
-D 'PACKAGE_STRING="osslsigncode 2.3"' \
1818
-D 'PACKAGE_BUGREPORT="[email protected]"' \
1919
-D ENABLE_CURL
2020
```
@@ -24,7 +24,7 @@
2424
path=%path%;c:\msys64\mingw64\bin
2525
cd osslsigncode-folder
2626
osslsigncode.exe -v
27-
osslsigncode 2.2, using:
27+
osslsigncode 2.3, using:
2828
OpenSSL 1.1.1g 21 Apr 2020 (Library: OpenSSL 1.1.1g 21 Apr 2020)
2929
libcurl/7.70.0 OpenSSL/1.1.1g (Schannel) zlib/1.2.11 brotli/1.0.7 libidn2/2.3.0
3030
libpsl/0.21.0 (+libidn2/2.3.0) libssh2/1.9.0 nghttp2/1.40.0
@@ -76,7 +76,7 @@
7676
-I 'C:/OpenSSL/include/' \
7777
-L 'C:/curl/lib' -lcurl \
7878
-I 'C:/curl/include' \
79-
-D 'PACKAGE_STRING="osslsigncode 2.2"' \
79+
-D 'PACKAGE_STRING="osslsigncode 2.3"' \
8080
-D 'PACKAGE_BUGREPORT="[email protected]"' \
8181
-D ENABLE_CURL
8282
```
@@ -90,7 +90,7 @@
9090
copy C:\msys64\mingw64\bin\zlib1.dll
9191
9292
osslsigncode.exe -v
93-
osslsigncode 2.2, using:
93+
osslsigncode 2.3, using:
9494
OpenSSL 1.1.1k 25 Mar 2021 (Library: OpenSSL 1.1.1k 25 Mar 2021)
9595
libcurl/7.78.0 OpenSSL/1.1.1k zlib/1.2.11
9696
```

NEWS.md

Lines changed: 13 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,19 @@
11
# osslsigncode change log
22

3-
### 2.3 (unreleased)
3+
### 2.3 (2022.03.06)
44

5-
- fixed memory safety
6-
- added bash completion script
7-
- added CA bundle auto-detection
5+
**CRITICAL SECURITY VULNERABILITIES**
6+
7+
This release fixes several critical memory corruption vulnerabilities.
8+
A malicious attacker could create a file, which, when processed with
9+
osslsigncode, triggers arbitrary code execution. Any previous version
10+
of osslsigncode should be immediately upgraded if the tool is used for
11+
processing of untrusted files.
12+
13+
- fixed several memory safety issues
14+
- fixed non-interactive PVK (MSBLOB) key decryption
15+
- added a bash completion script
16+
- added CA bundle path auto-detection
817

918
### 2.2 (2021.08.15)
1019

configure.ac

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
AC_PREREQ(2.60)
22

3-
AC_INIT([osslsigncode], [2.2.0], [[email protected]])
3+
AC_INIT([osslsigncode], [2.3.0], [[email protected]])
44
AC_CONFIG_AUX_DIR([.])
55
AC_CONFIG_HEADERS([config.h])
66
AM_INIT_AUTOMAKE

0 commit comments

Comments
 (0)