Skip to content

Commit deddd33

Browse files
Merge pull request #860 from ejohnstown/release-1.4.22-1
Release v1.4.22
2 parents b7c26d2 + 1938980 commit deddd33

File tree

1 file changed

+8
-1
lines changed

1 file changed

+8
-1
lines changed

ChangeLog.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,13 @@
99
and earlier. Users of wolfSSH must update or apply the fix patch and it’s
1010
recommended to update credentials used. This fix is also recommended for
1111
wolfSSH server applications. While there aren’t any specific attacks, the
12-
same defect is present.
12+
same defect is present. Thanks to Aina Toky Rasoamanana of Valeo and Olivier
13+
Levillain of Telecom SudParis for the report. (PR 855)
14+
- [Medium] CVE-2025-15382. The function used to clean up a path string may read
15+
one byte off the end of the bounds of the string. The function is used by the
16+
SCP handling in wolfSSH. This affects server applications with wolfSSH
17+
versions 1.4.12 through 1.4.21, inclusive. Thanks to Luigino Camastra from
18+
Aisle Research for the report. (PR 859)
1319

1420
## New Features
1521

@@ -50,6 +56,7 @@
5056

5157
## Fixes
5258

59+
- Fix off-by-1 read error when cleaning the file path for SCP. (PR 859)
5360
- Fixed incorrect handling of zero-length SSH strings in packet parsing. (PR
5461
857)
5562
- Fixed a worker-thread deadlock caused by blocked sends preventing

0 commit comments

Comments
 (0)