Releases: wolfSSL/wolfssl-py
Releases · wolfSSL/wolfssl-py
v5.8.4-stable
What's Changed
- Fix an issue which allowed a client without a cert to connect despite setting verify_mode to CERT_REQUIRED (CVE-2025-15346):
A vulnerability in the handling of verify_mode = CERT_REQUIRED in the wolfssl Python package (wolfssl-py) causes client certificate requirements to not be fully enforced. Because the WOLFSSL_VERIFY_FAIL_IF_NO_PEER_CERT flag was not included, the behavior effectively matched CERT_OPTIONAL: a peer certificate was verified if presented, but connections were incorrectly authenticated when no client certificate was provided. This results in improper authentication, allowing attackers to bypass mutual TLS (mTLS) client authentication by omitting a client certificate during the TLS handshake.
Thanks to Matan Radomski from Microsoft for the report. - Update for v5.8.4 release by @kareem-wolfssl in #63
v5.8.2-stable
v5.7.4-stable
v5.7.2-stable
wolfSSL-py v5.6.6-stable
What's Changed
- Fix for segfault issue in TLS v1.3 by @night1rider in #44
- Updating wolfSSL to v5.6.6 by @lealem47 in #51
wolfSSL-py v5.6.0-stable
What's Changed
- Updating wolfSSL to v5.6.0 by @danielinux in #42
wolfSSL-py v5.5.4
Update to wolfSSL version 5.5.4
wolfSSL-py v5.5.3-stable
What's Changed
- Fix TLSv1.3 support
- Disable oldtls support
- Add changelog
- Adding support for CRL and DTLS
- Fix alert history code
- Update wolfSSL to version 5.5.3
wolfSSL-py Release 5.4.0 (July 13, 2022)
Release 5.4.0 of wolfSSL-py embedded TLS has bug fixes including:
- Update to wolfSSL 5.4.0 C library
- Add GitHub Actions support and remove Travis CI support
wolfSSL-py Release 5.3.0 (May 13, 2022)
Release 5.3.0 of wolfSSL-py embedded TLS has bug fixes and new features including:
New Feature Additions
- Update to wolfSSL 5.3.0
- Build completely refactored to be more Python-like and easier to use
- Add support for wolfSSL ctx password callback
Fixes
- Raise error when wolfSSL_write() returns 0
- Update example certs to match main wolfSSL ones