File tree Expand file tree Collapse file tree 1 file changed +8
-1
lines changed
Expand file tree Collapse file tree 1 file changed +8
-1
lines changed Original file line number Diff line number Diff line change 99 and earlier. Users of wolfSSH must update or apply the fix patch and it’s
1010 recommended to update credentials used. This fix is also recommended for
1111 wolfSSH server applications. While there aren’t any specific attacks, the
12- same defect is present.
12+ same defect is present. Thanks to Aina Toky Rasoamanana of Valeo and Olivier
13+ Levillain of Telecom SudParis for the report. (PR 855)
14+ - [ Medium] CVE-2025 -15382. The function used to clean up a path string may read
15+ one byte off the end of the bounds of the string. The function is used by the
16+ SCP handling in wolfSSH. This affects server applications with wolfSSH
17+ versions 1.4.12 through 1.4.21, inclusive. Thanks to Luigino Camastra from
18+ Aisle Research for the report. (PR 859)
1319
1420## New Features
1521
5056
5157## Fixes
5258
59+ - Fix off-by-1 read error when cleaning the file path for SCP. (PR 859)
5360- Fixed incorrect handling of zero-length SSH strings in packet parsing. (PR
5461 857 )
5562- Fixed a worker-thread deadlock caused by blocked sends preventing
You can’t perform that action at this time.
0 commit comments