Source: golang-refraction-networking-utls
Version: 1.2.1-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for golang-refraction-networking-utls.

CVE-2026-26994[0]:
| uTLS is a fork of crypto/tls, created to customize ClientHello for
| fingerprinting resistance while still using it for the handshake. In
| versions 1.6.7 and below, uTLS did not implement the TLS 1.3
| downgrade protection mechanism specified in RFC 8446 Section 4.1.3
| when using a uTLS ClientHello spec. This allowed an active network
| adversary to downgrade TLS 1.3 connections initiated by a uTLS
| client to a lower TLS version (e.g., TLS 1.2) by modifying the
| ClientHello message to exclude the SupportedVersions extension,
| causing the server to respond with a TLS 1.2 ServerHello (along with
| a downgrade canary in the ServerHello random field). Because uTLS
| did not check the downgrade canary in the ServerHello random field,
| clients would accept the downgraded connection without detecting the
| attack. This attack could also be used by an active network attacker
| to fingerprint uTLS connections. This issue has been fixed in
| version 1.7.0.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-26994
    https://www.cve.org/CVERecord?id=CVE-2026-26994
[1] 
https://github.com/refraction-networking/utls/security/advisories/GHSA-pmc3-p9hx-jq96
[2] 
https://github.com/refraction-networking/utls/commit/f8892761e2a4d29054264651d3a86fda83bc83f9

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to