Skip to content

Commit 8e96268

Browse files
committed
Release v1.4.22
1. Update configure. 2. Update ChangeLog.
1 parent b5c9751 commit 8e96268

File tree

3 files changed

+84
-6
lines changed

3 files changed

+84
-6
lines changed

ChangeLog.md

Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,77 @@
1+
# wolfSSH v1.4.22 (December 31, 2025)
2+
3+
## Vulnerabilities
4+
5+
- [Critical] CVE-2025-14942. wolfSSH’s key exchange state machine can be
6+
manipulated to leak the client’s password in the clear, trick the client to
7+
send a bogus signature, or trick the client into skipping user
8+
authentication. This affects client applications with wolfSSH version 1.4.21
9+
and earlier. Users of wolfSSH must update or apply the fix patch and it’s
10+
recommended to update credentials used. This fix is also recommended for
11+
wolfSSH server applications. While there aren’t any specific attacks, the
12+
same defect is present.
13+
14+
## New Features
15+
16+
- Added a complete SFTP client example for the Renesas RX72N platform. (PR
17+
847)
18+
- Enabled TSIP support and provided cleaned-up configuration headers for the
19+
RX72N example. (PR 847)
20+
- Added FIPS-enabled build configurations to the Visual Studio project files.
21+
(PR 851)
22+
- Added documentation describing how to build and use the new FIPS Visual
23+
Studio configurations. (PR 851)
24+
- Introduced regression tests covering SSH agent signing, including error
25+
paths and successful operation. (PR 856)
26+
- Added regression tests that explicitly exercise WANT_READ / WANT_WRITE paths
27+
to guard against deadlocks. (PR 856)
28+
29+
## Improvements
30+
31+
- Refactored SSH string parsing by unifying GetString() and GetStringAlloc()
32+
around GetStringRef(), simplifying maintenance and reducing duplication. (PR
33+
857)
34+
- Enhanced SSH message-order validation by introducing explicit
35+
expected-message tracking and clearer message ID range macros. (PR 855)
36+
- Improved server-side out-of-order message checking to align behavior with the
37+
stricter client implementation. (PR 855)
38+
- Improved worker thread behavior under window backpressure by prioritizing
39+
receive handling, preventing stalls with small-window SFTP clients. (PR 856)
40+
- Hardened SSH agent handling logic by validating response types, tracking
41+
message IDs, and enforcing strict buffer size limits. (PR 845)
42+
- Improved SCP path handling by canonicalizing client-supplied base paths
43+
before filesystem access. (PR 845)
44+
- Improved portability by replacing non-standard <sys/errno.h> includes with
45+
standard <errno.h>. (PR 852)
46+
- Reduced logging overhead by defining WLOG as a no-op when debugging is
47+
disabled. (PR 839)
48+
- Updated documentation to better reflect current features, examples, and build
49+
options. (PR 851)
50+
51+
## Fixes
52+
53+
- Fixed incorrect handling of zero-length SSH strings in packet parsing. (PR
54+
857)
55+
- Fixed a worker-thread deadlock caused by blocked sends preventing
56+
window-adjust processing. (PR 856)
57+
- Fixed a double-free crash and eliminated a socket-close spin loop under error
58+
conditions. (PR 855)
59+
- Fixed uninitialized authentication data that could lead to undefined behavior
60+
during authentication. (PR 854)
61+
- Fixed SFTP connection interoperability issues discovered through
62+
cross-implementation testing. SFTP fix for init to handle channel data which
63+
resolves a potential interoperability SFTP connection issue. (PR 846)
64+
- Fixed SCP receive handling to reject traversal filenames containing path
65+
separators or “dot” components. (PR 845)
66+
- Fixed missing declaration of wc_SSH_KDF that caused build failures under
67+
strict compiler warnings. (PR 848)
68+
- Fixed SSH agent test setup so regression tests exercise the intended code
69+
paths. (PR 845)
70+
- Excluded a standalone regression test from Zephyr builds where it was
71+
incompatible with the Zephyr test model. (PR 855)
72+
73+
---
74+
175
# wolfSSH v1.4.21 (October 20, 2025)
276

377
## Vulnerabilities
@@ -51,6 +125,8 @@
51125
- Rename wolfssh test certs to avoid conflict with wolfssl test certs (PR 831)
52126
- Do not treat the shell as interactive until pty-req message request is received. This fixes an interoperability issue with WinSCP (PR 832)
53127

128+
---
129+
54130
# wolfSSH v1.4.20 (Feburary 20, 2025)
55131

56132
## New Features
@@ -73,6 +149,7 @@
73149
- Reinstate support for P521 and P384 curves by default when compiled in (PR 762)
74150
- Fix for wolfSSH client app handling of an empty hostname (PR 768)
75151

152+
---
76153

77154
# wolfSSH v1.4.19 (November 1, 2024)
78155

@@ -97,6 +174,7 @@
97174
- Minor static analysis report fixes (PR 740, 735)
98175
- Fix for handling SFTP transfer to non-existent folder (PR 743)
99176

177+
---
100178

101179
# wolfSSH v1.4.18 (July 22, 2024)
102180

configure.ac

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
# wolfssh
2-
# Copyright (C) 2014-2024 wolfSSL Inc.
2+
# Copyright (C) 2014-2026 wolfSSL Inc.
33
# All right reserved.
44

5-
AC_COPYRIGHT([Copyright (C) 2014-2024 wolfSSL Inc.])
6-
AC_INIT([wolfssh],[1.4.21],[support@wolfssl.com],[wolfssh],[https://www.wolfssl.com])
5+
AC_COPYRIGHT([Copyright (C) 2014-2026 wolfSSL Inc.])
6+
AC_INIT([wolfssh],[1.4.22],[support@wolfssl.com],[wolfssh],[https://www.wolfssl.com])
77
AC_PREREQ([2.69])
88
AC_CONFIG_AUX_DIR([build-aux])
99

@@ -18,7 +18,7 @@ AC_ARG_PROGRAM
1818
AC_CONFIG_MACRO_DIR([m4])
1919
AC_CONFIG_HEADERS([config.h])
2020

21-
WOLFSSH_LIBRARY_VERSION=18:0:0
21+
WOLFSSH_LIBRARY_VERSION=19:0:1
2222
# | | |
2323
# +-----+ | +----+
2424
# | | |

wolfssh/version.h

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,8 @@
3535
extern "C" {
3636
#endif
3737

38-
#define LIBWOLFSSH_VERSION_STRING "1.4.21"
39-
#define LIBWOLFSSH_VERSION_HEX 0x01004021
38+
#define LIBWOLFSSH_VERSION_STRING "1.4.22"
39+
#define LIBWOLFSSH_VERSION_HEX 0x01004022
4040

4141
#ifdef __cplusplus
4242
}

0 commit comments

Comments
 (0)