go.mod: update module github.com/pion/dtls/v3 to v3.0.11 [SECURITY]#883
Open
renovate[bot] wants to merge 1 commit intomainfrom
Open
go.mod: update module github.com/pion/dtls/v3 to v3.0.11 [SECURITY]#883renovate[bot] wants to merge 1 commit intomainfrom
renovate[bot] wants to merge 1 commit intomainfrom
Conversation
Contributor
Author
ℹ️ Artifact update noticeFile name: e2e/monitor/go.modIn order to perform the update(s) described in the table above, Renovate ran the
Details:
|
Codecov Report✅ All modified and coverable lines are covered by tests. 📢 Thoughts on this report? Let us know! |
49c38ba to
14cda00
Compare
joshuasing
approved these changes
Mar 4, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v3.0.0→v3.0.11Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
GitHub Vulnerability Alerts
CVE-2026-26014
Impact
Pion DTLS versions v1.0.0 through v3.0.10 use random nonce generation with AES GCM ciphers, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a "forbidden attack".
Patches
Upgrade to v3.1.1 or later. This version includes PR #796, which uses the 64-bit sequence number to populate the
nonce_explicitpart of the GCM nonce. This is according to best practice outlined in RFC 9325 section 7.2.1.v3.0.11 is a backport patch supporting Go v1.21
Workarounds
There are no workarounds without upgrading to version v3.0.11, v3.1.1 or later.
References
Commit fixing the bug: pion/dtls@61762de
Commit fixing the bug (backport): 90e241c
Pull request: #796
Pion DTLS's usage of random nonce generation with AES GCM ciphers risks leaking the authentication key
CVE-2026-26014 / GHSA-9f3f-wv7r-qc8r / GO-2026-4479
More information
Details
Impact
Pion DTLS versions v1.0.0 through v3.0.10 use random nonce generation with AES GCM ciphers, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a "forbidden attack".
Patches
Upgrade to v3.1.1 or later. This version includes PR #796, which uses the 64-bit sequence number to populate the
nonce_explicitpart of the GCM nonce. This is according to best practice outlined in RFC 9325 section 7.2.1.v3.0.11 is a backport patch supporting Go v1.21
Workarounds
There are no workarounds without upgrading to version v3.0.11, v3.1.1 or later.
References
Commit fixing the bug: pion/dtls@61762de
Commit fixing the bug (backport): 90e241c
Pull request: #796
Severity
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:NReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
pion/dtls (github.com/pion/dtls/v3)
v3.0.11Compare Source
Backport security fix for GHSA-9f3f-wv7r-qc8r (CVE-2026-26014)
This is the only release with the security fix for Go v1.21.
v3.0.10Compare Source
Changelog
713910aUpgrade to pion/transport/v4e0d3160Add the key share extension (#749)7a57e26Update CI configs to v0.11.3608d8c3eFix gosec slice bounds warnings (#764)7b9612eHandshake fragments assembly refactoring (#762)v3.0.9Compare Source
Changelog
ab5f89bImplement TLS_EMPTY_RENEGOTIATION_INFO_SCSVd5761acPrevent negative intervalsv3.0.8Compare Source
Changelog
ffd97f5Backoff handshake retransmit7ab1bc9Update actions/checkout action to v6bdb5f23Update module github.com/pion/transport/v3 to v3.1.1 (#754)1d9b6b1Update module github.com/pion/transport/v3 to v3.1.0c06c3a7Lock while writing to encryptedPacketsca7d80eUpdate CI configs to v0.11.329cfb13fImprove the record layer fuzz testsdaa0fd4Add fuzz tests for gcm9ed5950Add fuzz tests for ccm7b68bd9Add fuzz tests for packet buffer7c62411Update CI configs to v0.11.313e12f76Add more tests for prfe7cbd62Migrate elliptic curves from elliptic to ecdh6ff535fUpdate module github.com/pion/transport/v3 to v3.0.8f6b0286Add the supported_versions extension120a895Handle ECONNREFUSED timeouted044c0Update CI configs to v0.11.295611b14Apply go modernize27c3405Update actions/checkout action to v58764fbdUpdate CI configs to v0.11.26465f544Update CI configs to v0.11.256e1e3c9Update module github.com/stretchr/testify to v1.11.1495a7b5Update CI configs to v0.11.240b11eabUpdate module github.com/stretchr/testify to v1.11.0b8c2ab4Fix lint issues with golangci-lint@v20bf1902Update CI configs to v0.11.22v3.0.7Compare Source
Changelog
e3cf6bcComply with RFC5746 and RFC5246f0c0987Update module github.com/pion/logging to v0.2.463bf30cUpdate CI configs to v0.11.2034fbe21Replace interface{} with any8bf2c71Fix packet buffer read index after buffer resize806ff2fRefactor cfg.onFlightState, avoid data racef5e908fUpdate CI configs to v0.11.1958d3b7eUpdate lint rules, force testify/asserte57dc04Update social media links, move to discordv3.0.6Compare Source
What's Changed
Full Changelog: pion/dtls@v3.0.5...v3.0.6
v3.0.5Compare Source
Changelog
fbc7baeUpdate docker.io/library/golang Docker tag to v1.24 (#694)13b929bUpdate module golang.org/x/net to v0.37.0 (#697)3a0f50aUse crypto.Signer whenever possible (#681)16d6306Update module golang.org/x/net to v0.34.0 (#693)8eb9a91Upgrade golangci-lint, more linters1c0df61Update module github.com/pion/logging to v0.2.3 (#691)1e4ae60Update module golang.org/x/net to v0.33.0 [SECURITY]ceb8458Update module golang.org/x/crypto to v0.31.0 [SECURITY]4e34db5Update module golang.org/x/net to v0.31.002434c7Update module golang.org/x/crypto to v0.29.0v3.0.4Compare Source
Changelog
b3e02c4Update module golang.org/x/net to v0.30.03f61fd2Fix RSA signature verification issued796437Improve fuzzingv3.0.3Compare Source
Changelog
98a05d6Fix incorrect client retransmissionsd7f5feeUpdate module golang.org/x/net to v0.29.00be603aUpdate module golang.org/x/crypto to v0.27.00790369Update module golang.org/x/net to v0.28.0f13eec1Update module golang.org/x/crypto to v0.26.0e193dc2Update go.mod version to 1.20v3.0.2Compare Source
Changelog
1a02350Fix race between Conn.Close and Conn.Handshake032d60cUpdate CI configs to v0.11.15f6ecbc2Update docker.io/library/golang Docker tag to v1.23fd18984Fix pkg.go.dev linkv3.0.1Compare Source
Changelog
e20b162Fix multiple calls to Handshakef3e8a9eFix segfault in State::serialize method5a72b12Update module github.com/pion/transport/v3 to v3.0.7c5ab822Update module golang.org/x/net to v0.27.023674bdUpdate module golang.org/x/crypto to v0.25.07ab74fbAdd support for MKI in use_srtp7139e0eFix time units in example2ed7caaUpdate module github.com/pion/transport/v3 to v3.0.6Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.