chore(deps): update module github.com/cloudflare/circl to v1.6.1 [security] #158
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v1.1.0->v1.6.1GitHub Vulnerability Alerts
CVE-2023-1732
Impact
When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether
crypto/rand.Read()returns an error. In rare deployment cases (error thrown by theRead()function), this could lead to a predictable shared secret.The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides
crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.Patches
The fix was introduced in CIRCL v. 1.3.3
GHSA-9763-4f94-gfch
Impact
On some platforms, when an attacker can time decapsulation of Kyber on forged cipher texts, they could possibly learn (parts of) the secret key.
Does not apply to ephemeral usage, such as when used in the regular way in TLS.
Patches
Patched in 1.3.7.
References
CVE-2025-8556
Impact
The CIRCL implementation of FourQ fails to validate user-supplied low-order points during Diffie-Hellman key exchange, potentially allowing attackers to force the identity point and compromise session security.
Moreover, there is an incorrect point validation in ScalarMult can lead to incorrect results in the isEqual function and if a point is on the curve.
Patches
Version 1.6.1 (https://github.com/cloudflare/circl/tree/v1.6.1) mitigates the identified issues.
We acknowledge Alon Livne (Botanica Software Labs) for the reported findings.
Improper random reading in CIRCL
CVE-2023-1732 / GHSA-2q89-485c-9j2x / GO-2023-1765
More information
Details
Impact
When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether
crypto/rand.Read()returns an error. In rare deployment cases (error thrown by theRead()function), this could lead to a predictable shared secret.The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides
crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.Patches
The fix was introduced in CIRCL v. 1.3.3
Severity
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:NReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Leaked shared secret and weak blinding in github.com/cloudflare/circl
CVE-2023-1732 / GHSA-2q89-485c-9j2x / GO-2023-1765
More information
Details
When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.
The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
CIRCL's Kyber: timing side-channel (kyberslash2)
GHSA-9763-4f94-gfch / GO-2024-2453
More information
Details
Impact
On some platforms, when an attacker can time decapsulation of Kyber on forged cipher texts, they could possibly learn (parts of) the secret key.
Does not apply to ephemeral usage, such as when used in the regular way in TLS.
Patches
Patched in 1.3.7.
References
Severity
High
References
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Timing side channel in github.com/cloudflare/circl
GHSA-9763-4f94-gfch / GO-2024-2453
More information
Details
Timing side channel in github.com/cloudflare/circl
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
CIRCL-Fourq: Missing and wrong validation can lead to incorrect results in github.com/cloudflare/circl
CVE-2025-8556 / GHSA-2x5j-vhc8-9cwm / GO-2025-3754
More information
Details
CIRCL-Fourq: Missing and wrong validation can lead to incorrect results in github.com/cloudflare/circl
Severity
Unknown
References
This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).
CIRCL-Fourq: Missing and wrong validation can lead to incorrect results
CVE-2025-8556 / GHSA-2x5j-vhc8-9cwm / GO-2025-3754
More information
Details
Impact
The CIRCL implementation of FourQ fails to validate user-supplied low-order points during Diffie-Hellman key exchange, potentially allowing attackers to force the identity point and compromise session security.
Moreover, there is an incorrect point validation in ScalarMult can lead to incorrect results in the isEqual function and if a point is on the curve.
Patches
Version 1.6.1 (https://github.com/cloudflare/circl/tree/v1.6.1) mitigates the identified issues.
We acknowledge Alon Livne (Botanica Software Labs) for the reported findings.
Severity
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:NReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
cloudflare/circl (github.com/cloudflare/circl)
v1.6.1: CIRCL v1.6.1Compare Source
CIRCL v1.6.1
What's Changed
Full Changelog: cloudflare/circl@v1.6.0...v1.6.1
v1.6.0: CIRCL v1.6.0Compare Source
CIRCL v1.6.0
New!
What's Changed
New Contributors
Full Changelog: cloudflare/circl@v1.5.0...v1.6.0
v1.5.0: CIRCL v1.5.0Compare Source
CIRCL v1.5.0
New: ML-DSA, Module-Lattice-based Digital Signature Algorithm.
What's Changed
New Contributors
Full Changelog: cloudflare/circl@v1.4.0...v1.5.0
v1.4.0: CIRCL v1.4.0Compare Source
CIRCL v1.4.0
Changes
New: ML-KEM compatible with FIPS-203.
Commit History
Full Changelog: cloudflare/circl@v1.3.9...v1.4.0
v1.3.9: CIRCL v1.3.9Compare Source
CIRCL v1.3.9
Changes:
Commit History
Full Changelog: cloudflare/circl@v1.3.8...v1.3.9
v1.3.8: CIRCL v1.3.8Compare Source
CIRCL v1.3.8
New
Notice
What's Changed
puregobuild tag, removingnoasmbuild tag by @mattyclarkson in #492New Contributors
Full Changelog: cloudflare/circl@v1.3.7...v1.3.8
v1.3.7: CIRCL v1.3.7Compare Source
CIRCL v1.3.7
What's Changed
New Contributors
Full Changelog: cloudflare/circl@v1.3.6...v1.3.7
v1.3.6: CIRCL v1.3.6Compare Source
CIRCL v1.3.6
What's Changed
New Contributors
Full Changelog: cloudflare/circl@v1.3.3...v1.3.6
v1.3.5Compare Source
v1.3.4Compare Source
v1.3.3: CIRCL v1.3.3Compare Source
New Features
Security
What's Changed
New Contributors
Full Changelog: cloudflare/circl@v1.3.2...v1.3.3
v1.3.2: CIRCL v1.3.2Compare Source
What's Changed
Full Changelog: cloudflare/circl@v1.3.1...v1.3.2
v1.3.1: CIRCL v1.3.1Compare Source
What's Changed
Full Changelog: cloudflare/circl@v1.3.0...v1.3.1
v1.3.0: CIRCL v1.3.0Compare Source
New Features
Security
What's Changed
New Contributors
Full Changelog: cloudflare/circl@v1.2.0...v1.3.0
v1.2.0: CIRCL v1.2.0Compare Source
Security
What's Changed
New Contributors
Full Changelog: cloudflare/circl@v1.1.0...v1.2.0
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
Need help?
You can ask for more help in the following Slack channel: #proj-renovate-self-hosted. In that channel you can also find ADR and FAQ docs in the Resources section.