Skip to content

Conversation

@renovate-sh-app
Copy link

@renovate-sh-app renovate-sh-app bot commented Oct 13, 2025

This PR contains the following updates:

Package Change Age Confidence
github.com/cloudflare/circl v1.3.3 -> v1.6.1 age confidence

GitHub Vulnerability Alerts

GHSA-9763-4f94-gfch

Impact

On some platforms, when an attacker can time decapsulation of Kyber on forged cipher texts, they could possibly learn (parts of) the secret key.

Does not apply to ephemeral usage, such as when used in the regular way in TLS.

Patches

Patched in 1.3.7.

References

CVE-2025-8556

Impact

The CIRCL implementation of FourQ fails to validate user-supplied low-order points during Diffie-Hellman key exchange, potentially allowing attackers to force the identity point and compromise session security.

Moreover, there is an incorrect point validation in ScalarMult can lead to incorrect results in the isEqual function and if a point is on the curve.

Patches

Version 1.6.1 (https://github.com/cloudflare/circl/tree/v1.6.1) mitigates the identified issues.

We acknowledge Alon Livne (Botanica Software Labs) for the reported findings.


Timing side channel in github.com/cloudflare/circl

GHSA-9763-4f94-gfch / GO-2024-2453

More information

Details

Timing side channel in github.com/cloudflare/circl

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


CIRCL's Kyber: timing side-channel (kyberslash2)

GHSA-9763-4f94-gfch / GO-2024-2453

More information

Details

Impact

On some platforms, when an attacker can time decapsulation of Kyber on forged cipher texts, they could possibly learn (parts of) the secret key.

Does not apply to ephemeral usage, such as when used in the regular way in TLS.

Patches

Patched in 1.3.7.

References

Severity

High

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


CIRCL-Fourq: Missing and wrong validation can lead to incorrect results

CVE-2025-8556 / GHSA-2x5j-vhc8-9cwm / GO-2025-3754

More information

Details

Impact

The CIRCL implementation of FourQ fails to validate user-supplied low-order points during Diffie-Hellman key exchange, potentially allowing attackers to force the identity point and compromise session security.

Moreover, there is an incorrect point validation in ScalarMult can lead to incorrect results in the isEqual function and if a point is on the curve.

Patches

Version 1.6.1 (https://github.com/cloudflare/circl/tree/v1.6.1) mitigates the identified issues.

We acknowledge Alon Livne (Botanica Software Labs) for the reported findings.

Severity

  • CVSS Score: 3.7 / 10 (Low)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


CIRCL-Fourq: Missing and wrong validation can lead to incorrect results in github.com/cloudflare/circl

CVE-2025-8556 / GHSA-2x5j-vhc8-9cwm / GO-2025-3754

More information

Details

CIRCL-Fourq: Missing and wrong validation can lead to incorrect results in github.com/cloudflare/circl

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


Release Notes

cloudflare/circl (github.com/cloudflare/circl)

v1.6.1: CIRCL v1.6.1

Compare Source

CIRCL v1.6.1

  • Fixes some point checks on the FourQ curve.
  • Hybrid KEM fails on low-order points.
What's Changed

Full Changelog: cloudflare/circl@v1.6.0...v1.6.1

v1.6.0: CIRCL v1.6.0

Compare Source

CIRCL v1.6.0

New!
What's Changed
New Contributors

Full Changelog: cloudflare/circl@v1.5.0...v1.6.0

v1.5.0: CIRCL v1.5.0

Compare Source

CIRCL v1.5.0

New: ML-DSA, Module-Lattice-based Digital Signature Algorithm.

What's Changed
New Contributors

Full Changelog: cloudflare/circl@v1.4.0...v1.5.0

v1.4.0: CIRCL v1.4.0

Compare Source

CIRCL v1.4.0

Changes

New: ML-KEM compatible with FIPS-203.

Commit History

Full Changelog: cloudflare/circl@v1.3.9...v1.4.0

v1.3.9: CIRCL v1.3.9

Compare Source

CIRCL v1.3.9

Changes:
  • Fix bug on BLS12381 decoding elements.
Commit History

Full Changelog: cloudflare/circl@v1.3.8...v1.3.9

v1.3.8: CIRCL v1.3.8

Compare Source

CIRCL v1.3.8

New

  • BLS Signatures on top of BLS12-381.
  • Adopt faster squaring in pairings.
  • BlindRSA compliant with RFC9474.
  • (Verifiable) Secret Sharing compatible with the Group interface (elliptic curves).

Notice

What's Changed
New Contributors

Full Changelog: cloudflare/circl@v1.3.7...v1.3.8

v1.3.7: CIRCL v1.3.7

Compare Source

CIRCL v1.3.7

What's Changed
New Contributors

Full Changelog: cloudflare/circl@v1.3.6...v1.3.7

v1.3.6: CIRCL v1.3.6

Compare Source

CIRCL v1.3.6

What's Changed
New Contributors

Full Changelog: cloudflare/circl@v1.3.3...v1.3.6

v1.3.5

Compare Source

v1.3.4

Compare Source


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@renovate-sh-app renovate-sh-app bot requested review from a team as code owners October 13, 2025 18:19
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-cloudflare-circl-vulnerability branch 2 times, most recently from 31fd794 to a92269e Compare October 16, 2025 15:11
…urity]

| datasource | package                     | from   | to     |
| ---------- | --------------------------- | ------ | ------ |
| go         | github.com/cloudflare/circl | v1.3.3 | v1.6.1 |


Signed-off-by: renovate-sh-app[bot] <219655108+renovate-sh-app[bot]@users.noreply.github.com>
@renovate-sh-app renovate-sh-app bot force-pushed the renovate/go-github.com-cloudflare-circl-vulnerability branch from a92269e to 8b0c497 Compare October 29, 2025 18:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants