Skip to content

Commit c10896c

Browse files
authored
Merge pull request #844 from JacobBarthelmeh/release
prepare for release 1.4.21
2 parents 51414d6 + 3ff50e4 commit c10896c

File tree

3 files changed

+57
-4
lines changed

3 files changed

+57
-4
lines changed

ChangeLog.md

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,56 @@
1+
# wolfSSH v1.4.21 (October 20, 2025)
2+
3+
## Vulnerabilities
4+
5+
- [Critical] CVE-2025-11625 The client's host verification can be bypassed by a malicious server, and client credentials leaked. This affects client applications with wolfSSH version 1.4.20 and earlier. Users of wolfSSH on the client side must update or apply the fix patch and it’s recommended to update credentials used. Fixed in PR (https://github.com/wolfSSL/wolfssh/pull/840)
6+
7+
- [Med] CVE-2025-11624 Potential for stack overflow write when reading the file handle provided by an SFTP client. After a SFTP connection was established there is the case where a SFTP client could craft a malicious read, write or set state SFTP packet which would cause the SFTP server code to write into stack. Thanks to Stanislav Fort of Aisle Research for the report. Fixed in PR (https://github.com/wolfSSL/wolfssh/pull/834)
8+
9+
## New Features
10+
11+
- Curve25519 interoperability with LibSSH. Update to treat [email protected] as an alias for curve25519-sha256 (PR 789)
12+
- Microchip example for ATSAMV71Q21B and harmony filesystem support (PR 790)
13+
- Make Keyboard Interactive a compile time option, enabled using --enable-keyboard-interactive. Off by default. (PR 800)
14+
- wolfSSH support for using TPM based key for authentication (PR 754)
15+
- By default, soft disable AES-CBC. It isn't offered as a default encrypt algorithm, but may be set at runtime (PR 804)
16+
- Add ED25519 key generation support. (PR 823)
17+
18+
## Improvements
19+
20+
- Add GitHub Action for testing wolfSSH server with Paramiko SFTP client (PR 788)
21+
- Additional sanity checks on message types during rekey (PR 793)
22+
- FATFS improvements, test and Linux example (PR 787)
23+
- Adjust behavior when getting WOLFSSH_USERAUTH_REJECTED return from callback. It now will reject and not continue on with user auth attempts. (PR 837)
24+
- Rename arguments and variables to idx instead of index to avoid shadowed variables. (PR 828)
25+
- Move user filesystem override to the top of the ports check so that the override also overrides enabled ports. (PR 805)
26+
- Remove keyboard auth callback and use a generic auth callback (PR 807)
27+
- Update Espressif examples and add getting started info to Espressif README (PR 810, 771)
28+
- Disable old threading functions when SINGLE_THREADED (PR 809)
29+
- Replace Kyber 512 with ML-KEM 768. (PR 792)
30+
- Update SFTP status callback to output once per second. (PR 779)
31+
- Refactor to leverage wolfSSL FALLTHROUGH macro with switch statements. (PR 815)
32+
- Autoconf and Automake Updates (PR 821)
33+
- Simplify Test Build Flags (PR 818)
34+
- Fixed typo and spelling edits (PR 797, 798)
35+
36+
## Fixes
37+
38+
- Fix SFTP data truncation by moving sentSzSave to state structure(PR 785)
39+
- Fix SFTP Symlink Indication. (PR 791)
40+
- Fix warning on FATFS builds (PR 796)
41+
- Keyboard Interactive bug fixes (PR 801, 802)
42+
- Fix double-free on `wolfSSH_SFTPNAME_readdir` (PR 806)
43+
- Adjust the highwater check location to avoid masking the return value. (PR 795)
44+
- DoAsn1Key now fails when WOLFSSH_NO_RSA is defined (PR 808)
45+
- Avoid potential for overflow/underflow in comparison by rearranging evaluation of unsigned condition. (PR 814)
46+
- Fixing a batch of warning from Coverity reports. (PR 817, 820, 822)
47+
- Fix inet_addr accounting for '.' character (PR 816)
48+
- Fix to only send ext info once after SSH_MSG_NEWKEYS. (PR 819)
49+
- Fix "rejected" authentication in DoUserAuthRequestPublicKey() (PR 825)
50+
- Rename struct Buffer to WOLFSSH_BUFFER in wolfSSH_ShowSizes to match the previous rename.(PR 830)
51+
- Rename wolfssh test certs to avoid conflict with wolfssl test certs (PR 831)
52+
- Do not treat the shell as interactive until pty-req message request is received. This fixes an interoperability issue with WinSCP (PR 832)
53+
154
# wolfSSH v1.4.20 (Feburary 20, 2025)
255

356
## New Features

configure.ac

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
# All right reserved.
44

55
AC_COPYRIGHT([Copyright (C) 2014-2024 wolfSSL Inc.])
6-
AC_INIT([wolfssh],[1.4.20],[[email protected]],[wolfssh],[https://www.wolfssl.com])
6+
AC_INIT([wolfssh],[1.4.21],[[email protected]],[wolfssh],[https://www.wolfssl.com])
77
AC_PREREQ([2.69])
88
AC_CONFIG_AUX_DIR([build-aux])
99

@@ -18,7 +18,7 @@ AC_ARG_PROGRAM
1818
AC_CONFIG_MACRO_DIR([m4])
1919
AC_CONFIG_HEADERS([config.h])
2020

21-
WOLFSSH_LIBRARY_VERSION=17:2:10
21+
WOLFSSH_LIBRARY_VERSION=18:0:0
2222
# | | |
2323
# +-----+ | +----+
2424
# | | |

wolfssh/version.h

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,8 @@
3535
extern "C" {
3636
#endif
3737

38-
#define LIBWOLFSSH_VERSION_STRING "1.4.20"
39-
#define LIBWOLFSSH_VERSION_HEX 0x01004020
38+
#define LIBWOLFSSH_VERSION_STRING "1.4.21"
39+
#define LIBWOLFSSH_VERSION_HEX 0x01004021
4040

4141
#ifdef __cplusplus
4242
}

0 commit comments

Comments
 (0)