Skip to content

Conversation

@renovate-sh-app
Copy link

@renovate-sh-app renovate-sh-app bot commented Oct 17, 2025

This PR contains the following updates:

Package Change Age Confidence
github.com/cloudflare/circl v1.1.0 -> v1.6.1 age confidence

GitHub Vulnerability Alerts

CVE-2023-1732

Impact

When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.

The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.

Patches

The fix was introduced in CIRCL v. 1.3.3

GHSA-9763-4f94-gfch

Impact

On some platforms, when an attacker can time decapsulation of Kyber on forged cipher texts, they could possibly learn (parts of) the secret key.

Does not apply to ephemeral usage, such as when used in the regular way in TLS.

Patches

Patched in 1.3.7.

References

CVE-2025-8556

Impact

The CIRCL implementation of FourQ fails to validate user-supplied low-order points during Diffie-Hellman key exchange, potentially allowing attackers to force the identity point and compromise session security.

Moreover, there is an incorrect point validation in ScalarMult can lead to incorrect results in the isEqual function and if a point is on the curve.

Patches

Version 1.6.1 (https://github.com/cloudflare/circl/tree/v1.6.1) mitigates the identified issues.

We acknowledge Alon Livne (Botanica Software Labs) for the reported findings.


Improper random reading in CIRCL

CVE-2023-1732 / GHSA-2q89-485c-9j2x / GO-2023-1765

More information

Details

Impact

When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.

The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.

Patches

The fix was introduced in CIRCL v. 1.3.3

Severity

  • CVSS Score: 5.3 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Leaked shared secret and weak blinding in github.com/cloudflare/circl

CVE-2023-1732 / GHSA-2q89-485c-9j2x / GO-2023-1765

More information

Details

When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.

The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


CIRCL's Kyber: timing side-channel (kyberslash2)

GHSA-9763-4f94-gfch / GO-2024-2453

More information

Details

Impact

On some platforms, when an attacker can time decapsulation of Kyber on forged cipher texts, they could possibly learn (parts of) the secret key.

Does not apply to ephemeral usage, such as when used in the regular way in TLS.

Patches

Patched in 1.3.7.

References

Severity

High

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Timing side channel in github.com/cloudflare/circl

GHSA-9763-4f94-gfch / GO-2024-2453

More information

Details

Timing side channel in github.com/cloudflare/circl

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


CIRCL-Fourq: Missing and wrong validation can lead to incorrect results in github.com/cloudflare/circl

CVE-2025-8556 / GHSA-2x5j-vhc8-9cwm / GO-2025-3754

More information

Details

CIRCL-Fourq: Missing and wrong validation can lead to incorrect results in github.com/cloudflare/circl

Severity

Unknown

References

This data is provided by OSV and the Go Vulnerability Database (CC-BY 4.0).


CIRCL-Fourq: Missing and wrong validation can lead to incorrect results

CVE-2025-8556 / GHSA-2x5j-vhc8-9cwm / GO-2025-3754

More information

Details

Impact

The CIRCL implementation of FourQ fails to validate user-supplied low-order points during Diffie-Hellman key exchange, potentially allowing attackers to force the identity point and compromise session security.

Moreover, there is an incorrect point validation in ScalarMult can lead to incorrect results in the isEqual function and if a point is on the curve.

Patches

Version 1.6.1 (https://github.com/cloudflare/circl/tree/v1.6.1) mitigates the identified issues.

We acknowledge Alon Livne (Botanica Software Labs) for the reported findings.

Severity

  • CVSS Score: 3.7 / 10 (Low)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Release Notes

cloudflare/circl (github.com/cloudflare/circl)

v1.6.1: CIRCL v1.6.1

Compare Source

CIRCL v1.6.1

  • Fixes some point checks on the FourQ curve.
  • Hybrid KEM fails on low-order points.
What's Changed

Full Changelog: cloudflare/circl@v1.6.0...v1.6.1

v1.6.0: CIRCL v1.6.0

Compare Source

CIRCL v1.6.0

New!
What's Changed
New Contributors

Full Changelog: cloudflare/circl@v1.5.0...v1.6.0

v1.5.0: CIRCL v1.5.0

Compare Source

CIRCL v1.5.0

New: ML-DSA, Module-Lattice-based Digital Signature Algorithm.

What's Changed
New Contributors

Full Changelog: cloudflare/circl@v1.4.0...v1.5.0

v1.4.0: CIRCL v1.4.0

Compare Source

CIRCL v1.4.0

Changes

New: ML-KEM compatible with FIPS-203.

Commit History

Full Changelog: cloudflare/circl@v1.3.9...v1.4.0

v1.3.9: CIRCL v1.3.9

Compare Source

CIRCL v1.3.9

Changes:
  • Fix bug on BLS12381 decoding elements.
Commit History

Full Changelog: cloudflare/circl@v1.3.8...v1.3.9

v1.3.8: CIRCL v1.3.8

Compare Source

CIRCL v1.3.8

New

  • BLS Signatures on top of BLS12-381.
  • Adopt faster squaring in pairings.
  • BlindRSA compliant with RFC9474.
  • (Verifiable) Secret Sharing compatible with the Group interface (elliptic curves).

Notice

What's Changed
New Contributors

Full Changelog: cloudflare/circl@v1.3.7...v1.3.8

v1.3.7: CIRCL v1.3.7

Compare Source

CIRCL v1.3.7

What's Changed
New Contributors

Full Changelog: cloudflare/circl@v1.3.6...v1.3.7

v1.3.6: CIRCL v1.3.6

Compare Source

CIRCL v1.3.6

What's Changed
New Contributors

Full Changelog: cloudflare/circl@v1.3.3...v1.3.6

v1.3.5

Compare Source

v1.3.4

Compare Source

v1.3.3: CIRCL v1.3.3

Compare Source

New Features

  • ASCON light-weight authenticated encryption.
  • Hybrid KEM for HPKE based on Kyber and X25519.
  • CIRCL can be compiled both as static and dynamic linking modes.

Security

  • Fixes error-handling on rand readers.

What's Changed

New Contributors

Full Changelog: cloudflare/circl@v1.3.2...v1.3.3

v1.3.2: CIRCL v1.3.2

Compare Source

What's Changed

Full Changelog: cloudflare/circl@v1.3.1...v1.3.2

v1.3.1: CIRCL v1.3.1

Compare Source

What's Changed

Full Changelog: cloudflare/circl@v1.3.0...v1.3.1

v1.3.0: CIRCL v1.3.0

Compare Source

New Features

  • CPABE: A ciphertext-policy attribute-based encryption based on TKN19 paper.
  • Blind RSA signatures.
  • Schnorr and DLEQ proofs of knowledge on elliptic curve groups.

Security

  • SIDH/SIKE was deprecated. This applies to dh and kem packages.

What's Changed

New Contributors

Full Changelog: cloudflare/circl@v1.2.0...v1.3.0

v1.2.0: CIRCL v1.2.0

Compare Source

Security

  • Included countermeasures against Hertzbleed attack.

What's Changed

New Contributors

Full Changelog: cloudflare/circl@v1.1.0...v1.2.0


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

Need help?

You can ask for more help in the following Slack channel: #proj-renovate-self-hosted. In that channel you can also find ADR and FAQ docs in the Resources section.

…urity]

| datasource | package                     | from   | to     |
| ---------- | --------------------------- | ------ | ------ |
| go         | github.com/cloudflare/circl | v1.1.0 | v1.6.1 |


Signed-off-by: renovate-sh-app[bot] <219655108+renovate-sh-app[bot]@users.noreply.github.com>
@renovate-sh-app
Copy link
Author

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.21 -> 1.22.0
go (toolchain) 1.21.5 -> 1.24.9

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants