mirror of
https://github.com/cbeuw/Cloak.git
synced 2026-04-25 04:25:59 +03:00
[PR #306] [CLOSED] fix(deps): update module github.com/refraction-networking/utls to v1.7.0 [security] - autoclosed #310
Labels
No labels
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/Cloak#310
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/cbeuw/Cloak/pull/306
Author: @renovate[bot]
Created: 4/23/2025
Status: ❌ Closed
Base:
master← Head:renovate/go-github.com-refraction-networking-utls-vulnerability📝 Commits (1)
e13ab26Update module github.com/refraction-networking/utls to v1.7.0 [SECURITY]📊 Changes
1 file changed (+1 additions, -1 deletions)
View changed files
📝
go.mod(+1 -1)📄 Description
This PR contains the following updates:
v1.6.6->v1.7.0GitHub Vulnerability Alerts
GHSA-pmc3-p9hx-jq96
Description
Before version 1.7.0, utls did not implement the TLS 1.3 downgrade protection mechanism specified in RFC 8446 Section 4.1.3 when using a utls ClientHello spec. This allowed an active network adversary to downgrade TLS 1.3 connections initiated by a utls client to a lower TLS version (e.g., TLS 1.2) by modifying the ClientHello message to exclude the SupportedVersions extension, causing the server to respond with a TLS 1.2 ServerHello (along with a downgrade canary in the ServerHello random field). Because utls did not check the downgrade canary in the ServerHello random field, clients would accept the downgraded connection without detecting the attack. This attack could also be used by an active network attacker to fingerprint utls connections.
Fix Commit or Pull Request
refraction-networking/utls#337, specifically refraction-networking/utls@f8892761e2
References
Release Notes
refraction-networking/utls (github.com/refraction-networking/utls)
v1.7.0Compare Source
What's Changed
New Contributors
Full Changelog: https://github.com/refraction-networking/utls/compare/v1.6.7...v1.7.0
v1.6.7: Allow inspecting Client Hello before locking Session/PSKCompare Source
What's Changed
Full Changelog: https://github.com/refraction-networking/utls/compare/v1.6.6...v1.6.7
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.