|
| 1 | +# wolfSSH v1.4.22 (December 31, 2025) |
| 2 | + |
| 3 | +## Vulnerabilities |
| 4 | + |
| 5 | +- [Critical] CVE-2025-14942. wolfSSH’s key exchange state machine can be |
| 6 | + manipulated to leak the client’s password in the clear, trick the client to |
| 7 | + send a bogus signature, or trick the client into skipping user |
| 8 | + authentication. This affects client applications with wolfSSH version 1.4.21 |
| 9 | + and earlier. Users of wolfSSH must update or apply the fix patch and it’s |
| 10 | + recommended to update credentials used. This fix is also recommended for |
| 11 | + wolfSSH server applications. While there aren’t any specific attacks, the |
| 12 | + same defect is present. |
| 13 | + |
| 14 | +## New Features |
| 15 | + |
| 16 | +- Added a complete SFTP client example for the Renesas RX72N platform. (PR |
| 17 | + 847) |
| 18 | +- Enabled TSIP support and provided cleaned-up configuration headers for the |
| 19 | + RX72N example. (PR 847) |
| 20 | +- Added FIPS-enabled build configurations to the Visual Studio project files. |
| 21 | + (PR 851) |
| 22 | +- Added documentation describing how to build and use the new FIPS Visual |
| 23 | + Studio configurations. (PR 851) |
| 24 | +- Introduced regression tests covering SSH agent signing, including error |
| 25 | + paths and successful operation. (PR 856) |
| 26 | +- Added regression tests that explicitly exercise WANT_READ / WANT_WRITE paths |
| 27 | + to guard against deadlocks. (PR 856) |
| 28 | + |
| 29 | +## Improvements |
| 30 | + |
| 31 | +- Refactored SSH string parsing by unifying GetString() and GetStringAlloc() |
| 32 | + around GetStringRef(), simplifying maintenance and reducing duplication. (PR |
| 33 | + 857) |
| 34 | +- Enhanced SSH message-order validation by introducing explicit |
| 35 | + expected-message tracking and clearer message ID range macros. (PR 855) |
| 36 | +- Improved server-side out-of-order message checking to align behavior with the |
| 37 | + stricter client implementation. (PR 855) |
| 38 | +- Improved worker thread behavior under window backpressure by prioritizing |
| 39 | + receive handling, preventing stalls with small-window SFTP clients. (PR 856) |
| 40 | +- Hardened SSH agent handling logic by validating response types, tracking |
| 41 | + message IDs, and enforcing strict buffer size limits. (PR 845) |
| 42 | +- Improved SCP path handling by canonicalizing client-supplied base paths |
| 43 | + before filesystem access. (PR 845) |
| 44 | +- Improved portability by replacing non-standard <sys/errno.h> includes with |
| 45 | + standard <errno.h>. (PR 852) |
| 46 | +- Reduced logging overhead by defining WLOG as a no-op when debugging is |
| 47 | + disabled. (PR 839) |
| 48 | +- Updated documentation to better reflect current features, examples, and build |
| 49 | + options. (PR 851) |
| 50 | + |
| 51 | +## Fixes |
| 52 | + |
| 53 | +- Fixed incorrect handling of zero-length SSH strings in packet parsing. (PR |
| 54 | + 857) |
| 55 | +- Fixed a worker-thread deadlock caused by blocked sends preventing |
| 56 | + window-adjust processing. (PR 856) |
| 57 | +- Fixed a double-free crash and eliminated a socket-close spin loop under error |
| 58 | + conditions. (PR 855) |
| 59 | +- Fixed uninitialized authentication data that could lead to undefined behavior |
| 60 | + during authentication. (PR 854) |
| 61 | +- Fixed SFTP connection interoperability issues discovered through |
| 62 | + cross-implementation testing. SFTP fix for init to handle channel data which |
| 63 | + resolves a potential interoperability SFTP connection issue. (PR 846) |
| 64 | +- Fixed SCP receive handling to reject traversal filenames containing path |
| 65 | + separators or “dot” components. (PR 845) |
| 66 | +- Fixed missing declaration of wc_SSH_KDF that caused build failures under |
| 67 | + strict compiler warnings. (PR 848) |
| 68 | +- Fixed SSH agent test setup so regression tests exercise the intended code |
| 69 | + paths. (PR 845) |
| 70 | +- Excluded a standalone regression test from Zephyr builds where it was |
| 71 | + incompatible with the Zephyr test model. (PR 855) |
| 72 | + |
| 73 | +--- |
| 74 | + |
1 | 75 | # wolfSSH v1.4.21 (October 20, 2025) |
2 | 76 |
|
3 | 77 | ## Vulnerabilities |
|
51 | 125 | - Rename wolfssh test certs to avoid conflict with wolfssl test certs (PR 831) |
52 | 126 | - Do not treat the shell as interactive until pty-req message request is received. This fixes an interoperability issue with WinSCP (PR 832) |
53 | 127 |
|
| 128 | +--- |
| 129 | + |
54 | 130 | # wolfSSH v1.4.20 (Feburary 20, 2025) |
55 | 131 |
|
56 | 132 | ## New Features |
|
73 | 149 | - Reinstate support for P521 and P384 curves by default when compiled in (PR 762) |
74 | 150 | - Fix for wolfSSH client app handling of an empty hostname (PR 768) |
75 | 151 |
|
| 152 | +--- |
76 | 153 |
|
77 | 154 | # wolfSSH v1.4.19 (November 1, 2024) |
78 | 155 |
|
|
97 | 174 | - Minor static analysis report fixes (PR 740, 735) |
98 | 175 | - Fix for handling SFTP transfer to non-existent folder (PR 743) |
99 | 176 |
|
| 177 | +--- |
100 | 178 |
|
101 | 179 | # wolfSSH v1.4.18 (July 22, 2024) |
102 | 180 |
|
|
0 commit comments