chore(deps): update module github.com/refraction-networking/utls to v1.7.0 [security] - autoclosed
This MR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
github.com/refraction-networking/utls | require | minor |
v1.6.7 -> v1.7.0
|
ServerHellos are accepted without checking TLS 1.3 downgrade canaries in github.com/refraction-networking/utls
GHSA-pmc3-p9hx-jq96 / GO-2025-3638
More information
Details
Before version 1.7.0, utls did not implement the TLS 1.3 downgrade protection mechanism specified in RFC 8446 Section 4.1.3 when using a utls ClientHello spec. This allowed an active network adversary to downgrade TLS 1.3 connections initiated by a utls client to a lower TLS version (e.g., TLS 1.2) by modifying the ClientHello message to exclude the SupportedVersions extension, causing the server to respond with a TLS 1.2 ServerHello (along with a downgrade canary in the ServerHello random field). Because utls did not check the downgrade canary in the ServerHello random field, clients would accept the downgraded connection without detecting the attack. This attack could also be used by an active network attacker to fingerprint utls connections.
Severity
Unknown
References
- https://github.com/advisories/GHSA-pmc3-p9hx-jq96
- https://github.com/refraction-networking/utls/commit/f8892761e2a4d29054264651d3a86fda83bc83f9
- https://github.com/refraction-networking/utls/pull/337
- https://github.com/refraction-networking/utls/issues/181
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
uTLS ServerHellos are accepted without checking TLS 1.3 downgrade canaries
GHSA-pmc3-p9hx-jq96 / GO-2025-3638
More information
Details
Description
Before version 1.7.0, utls did not implement the TLS 1.3 downgrade protection mechanism specified in RFC 8446 Section 4.1.3 when using a utls ClientHello spec. This allowed an active network adversary to downgrade TLS 1.3 connections initiated by a utls client to a lower TLS version (e.g., TLS 1.2) by modifying the ClientHello message to exclude the SupportedVersions extension, causing the server to respond with a TLS 1.2 ServerHello (along with a downgrade canary in the ServerHello random field). Because utls did not check the downgrade canary in the ServerHello random field, clients would accept the downgraded connection without detecting the attack. This attack could also be used by an active network attacker to fingerprint utls connections.
Fix Commit or Merge Request
refraction-networking/utls#337, specifically refraction-networking/utls@f8892761e2a4d29054264651d3a86fda83bc83f9
References
Severity
- CVSS Score: 6.5 / 10 (Medium)
- Vector String:
CVSS:3.1/AV:N/AC:L/MR:N/UI:N/S:U/C:L/I:L/A:N
References
- https://github.com/refraction-networking/utls/security/advisories/GHSA-pmc3-p9hx-jq96
- https://github.com/refraction-networking/utls/issues/181
- https://github.com/refraction-networking/utls/pull/337
- https://github.com/refraction-networking/utls/commit/f8892761e2a4d29054264651d3a86fda83bc83f9
- https://github.com/refraction-networking/utls
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
refraction-networking/utls (github.com/refraction-networking/utls)
v1.7.0
What's Changed
- Fix Config.InsecureSkipTimeVerify not being respected by @adotkhan in https://github.com/refraction-networking/utls/pull/303
- Fixes session ticket / PSK not set by @adotkhan in https://github.com/refraction-networking/utls/pull/302
- fix: generate ClientHelloSpec only once by @adotkhan in https://github.com/refraction-networking/utls/pull/306
- fix: extMasterSecret mismatch with extended_master_secret extension by @adotkhan in https://github.com/refraction-networking/utls/pull/307
- Merge changes from go 1.23.4 by @mingyech in https://github.com/refraction-networking/utls/pull/323
- build(deps): bump golang.org/x/net from 0.23.0 to 0.33.0 by @dependabot in https://github.com/refraction-networking/utls/pull/326
- Merge changes from go 1.24.0 by @mingyech in https://github.com/refraction-networking/utls/pull/329
- Add Chrome 131 parrot and ML-KEM support by @BRUHItsABunny in https://github.com/refraction-networking/utls/pull/322
- feat: add support for ECH when using custom clienthello specs by @mingyech in https://github.com/refraction-networking/utls/pull/331
- Fix check for TLS downgrade canary by @mingyech in https://github.com/refraction-networking/utls/pull/337
- build(deps): bump golang.org/x/net from 0.33.0 to 0.38.0 by @dependabot in https://github.com/refraction-networking/utls/pull/336
New Contributors
- @mingyech made their first contribution in https://github.com/refraction-networking/utls/pull/323
- @BRUHItsABunny made their first contribution in https://github.com/refraction-networking/utls/pull/322
Full Changelog: https://github.com/refraction-networking/utls/compare/v1.6.7...v1.7.0
Configuration
-
If you want to rebase/retry this MR, check this box
This MR has been generated by Renovate Bot.