[PR #328] fix(deps): update module github.com/refraction-networking/utls to v1.8.2 [security] #319

Open
opened 2026-02-26 12:34:36 +03:00 by kerem · 0 comments
Owner

📋 Pull Request Information

Original PR: https://github.com/cbeuw/Cloak/pull/328
Author: @renovate[bot]
Created: 2/19/2026
Status: 🔄 Open

Base: masterHead: renovate/go-github.com-refraction-networking-utls-vulnerability


📝 Commits (1)

  • 2e66821 fix(deps): update module github.com/refraction-networking/utls to v1.8.2 [security]

📊 Changes

2 files changed (+3 additions, -1 deletions)

View changed files

📝 go.mod (+1 -1)
📝 go.sum (+2 -0)

📄 Description

This PR contains the following updates:

Package Change Age Confidence
github.com/refraction-networking/utls v1.8.0v1.8.2 age confidence

GitHub Vulnerability Alerts

CVE-2026-27017

There is a fingerprint mismatch with Chrome when using GREASE ECH, having to do with ciphersuite selection. When Chrome selects the preferred ciphersuite in the outer ClientHello and the ciphersuite for ECH, it does so consistently based on hardware support. That means, for example, if it prefers AES for the outer ciphersuite, it would also use AES for ECH. The Chrome parrot in utls hardcodes AES preference for outer ciphersuites but selects the ECH ciphersuite randomly between AES and ChaCha20. So there is a 50% chance of selecting ChaCha20 for ECH while using AES for the outer ciphersuite, which is impossible in Chrome.

This is only a problem in GREASE ECH, since in real ECH Chrome selects the first valid ciphersuite when AES is preferred, which is the same in utls. So no change is done there.

Affected symbols: HelloChrome_120, HelloChrome_120_PQ, HelloChrome_131, HelloChrome_133

Fix commit: 24bd1e05a788c1add7f3037f4532ea552b2cee07

Thanks to telegram @​acgdaily for reporting this issue.

CVE-2026-26995

The padding extension was incorrectly removed in utls for the non-pq variant of Chrome 120 fingerprint. Chrome removed this extension only when sending pq keyshares. Only this fingerprint is affected since newer fingerprints have pq keyshares by default and older fingerprints have this extension.

Affected symbols: HelloChrome_120

Fix commit: 8fe0b08e9a0e7e2d08b268f451f2c79962e6acd0

Thanks to telegram @​acgdaily for reporting this issue.


Release Notes

refraction-networking/utls (github.com/refraction-networking/utls)

v1.8.2: security update

Compare Source

Fixes a fingerprint mismatch on the Chrome 120 fingerprint. Credit to telegram @​acgdaily for reporting this issue.

What's Changed

Full Changelog: https://github.com/refraction-networking/utls/compare/v1.8.1...v1.8.2

v1.8.1: Bug fixes

Compare Source

This update includes several bug fixes.

In particular, users of Chrome>=120 parrots should update ASAP. See #​375 for details. Thanks to the original reporter for reporting this issue.

What's Changed
New Contributors

Full Changelog: https://github.com/refraction-networking/utls/compare/v1.8.0...v1.8.1


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.


🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.

## 📋 Pull Request Information **Original PR:** https://github.com/cbeuw/Cloak/pull/328 **Author:** [@renovate[bot]](https://github.com/apps/renovate) **Created:** 2/19/2026 **Status:** 🔄 Open **Base:** `master` ← **Head:** `renovate/go-github.com-refraction-networking-utls-vulnerability` --- ### 📝 Commits (1) - [`2e66821`](https://github.com/cbeuw/Cloak/commit/2e66821c9db85eb22d9c66e338098c3a0b121134) fix(deps): update module github.com/refraction-networking/utls to v1.8.2 [security] ### 📊 Changes **2 files changed** (+3 additions, -1 deletions) <details> <summary>View changed files</summary> 📝 `go.mod` (+1 -1) 📝 `go.sum` (+2 -0) </details> ### 📄 Description This PR contains the following updates: | Package | Change | [Age](https://docs.renovatebot.com/merge-confidence/) | [Confidence](https://docs.renovatebot.com/merge-confidence/) | |---|---|---|---| | [github.com/refraction-networking/utls](https://redirect.github.com/refraction-networking/utls) | `v1.8.0` → `v1.8.2` | ![age](https://developer.mend.io/api/mc/badges/age/go/github.com%2frefraction-networking%2futls/v1.8.2?slim=true) | ![confidence](https://developer.mend.io/api/mc/badges/confidence/go/github.com%2frefraction-networking%2futls/v1.8.0/v1.8.2?slim=true) | ### GitHub Vulnerability Alerts #### [CVE-2026-27017](https://redirect.github.com/refraction-networking/utls/security/advisories/GHSA-7m29-f4hw-g2vx) There is a fingerprint mismatch with Chrome when using GREASE ECH, having to do with ciphersuite selection. When Chrome selects the preferred ciphersuite in the outer ClientHello and the ciphersuite for ECH, it does so consistently based on hardware support. That means, for example, if it prefers AES for the outer ciphersuite, it would also use AES for ECH. The Chrome parrot in utls hardcodes AES preference for outer ciphersuites but selects the ECH ciphersuite randomly between AES and ChaCha20. So there is a 50% chance of selecting ChaCha20 for ECH while using AES for the outer ciphersuite, which is impossible in Chrome. This is only a problem in GREASE ECH, since in real ECH Chrome selects the first valid ciphersuite when AES is preferred, which is the same in utls. So no change is done there. Affected symbols: `HelloChrome_120`, `HelloChrome_120_PQ`, `HelloChrome_131`, `HelloChrome_133` Fix commit: 24bd1e05a788c1add7f3037f4532ea552b2cee07 Thanks to telegram @&#8203;acgdaily for reporting this issue. #### [CVE-2026-26995](https://redirect.github.com/refraction-networking/utls/security/advisories/GHSA-rrxv-pmq9-x67r) The padding extension was incorrectly removed in utls for the non-pq variant of Chrome 120 fingerprint. Chrome removed this extension only when sending pq keyshares. Only this fingerprint is affected since newer fingerprints have pq keyshares by default and older fingerprints have this extension. Affected symbols: `HelloChrome_120` Fix commit: 8fe0b08e9a0e7e2d08b268f451f2c79962e6acd0 Thanks to telegram @&#8203;acgdaily for reporting this issue. --- ### Release Notes <details> <summary>refraction-networking/utls (github.com/refraction-networking/utls)</summary> ### [`v1.8.2`](https://redirect.github.com/refraction-networking/utls/releases/tag/v1.8.2): security update [Compare Source](https://redirect.github.com/refraction-networking/utls/compare/v1.8.1...v1.8.2) Fixes a fingerprint mismatch on the Chrome 120 fingerprint. Credit to telegram [@&#8203;acgdaily](https://redirect.github.com/acgdaily) for reporting this issue. #### What's Changed - fix: add missing padding extension for chrome 120 by [@&#8203;mingyech](https://redirect.github.com/mingyech) in [#&#8203;381](https://redirect.github.com/refraction-networking/utls/pull/381) **Full Changelog**: <https://github.com/refraction-networking/utls/compare/v1.8.1...v1.8.2> ### [`v1.8.1`](https://redirect.github.com/refraction-networking/utls/releases/tag/v1.8.1): Bug fixes [Compare Source](https://redirect.github.com/refraction-networking/utls/compare/v1.8.0...v1.8.1) This update includes several bug fixes. In particular, users of Chrome>=120 parrots should update ASAP. See [#&#8203;375](https://redirect.github.com/refraction-networking/utls/issues/375) for details. Thanks to the original reporter for reporting this issue. ##### What's Changed - fix: `PubServerHelloMsg.ServerShare` is not exported correctly by [@&#8203;wwqgtxx](https://redirect.github.com/wwqgtxx) in [#&#8203;361](https://redirect.github.com/refraction-networking/utls/pull/361) - fix: use AES in GREASE ECH for Chrome fingerprint by [@&#8203;mingyech](https://redirect.github.com/mingyech) in [#&#8203;375](https://redirect.github.com/refraction-networking/utls/pull/375) ##### New Contributors - [@&#8203;wwqgtxx](https://redirect.github.com/wwqgtxx) made their first contribution in [#&#8203;361](https://redirect.github.com/refraction-networking/utls/pull/361) **Full Changelog**: <https://github.com/refraction-networking/utls/compare/v1.8.0...v1.8.1> </details> --- ### Configuration 📅 **Schedule**: Branch creation - "" (UTC), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box --- This PR was generated by [Mend Renovate](https://mend.io/renovate/). View the [repository job log](https://developer.mend.io/github/cbeuw/Cloak). <!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0My4yNS4xMSIsInVwZGF0ZWRJblZlciI6IjQzLjI1LjExIiwidGFyZ2V0QnJhbmNoIjoibWFzdGVyIiwibGFiZWxzIjpbXX0=--> --- <sub>🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.</sub>
Sign in to join this conversation.
No labels
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/Cloak#319
No description provided.