CVE-2022-29189
Publication date 21 May 2022
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.4, a buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or timed out. An attacker could exploit this to cause excessive memory usage. Version 2.1.4 contains a patch for this issue. There are currently no known workarounds available.
Status
Package | Ubuntu Release | Status |
---|---|---|
pion | 18.04 LTS bionic |
Needs evaluation
|
16.04 LTS xenial |
Needs evaluation
|
|
snowflake | 25.04 plucky |
Needs evaluation
|
24.10 oracular |
Needs evaluation
|
|
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy |
Needs evaluation
|
|
telegraf | 25.04 plucky | Not in release |
24.10 oracular | Not in release | |
24.04 LTS noble | Not in release | |
22.04 LTS jammy |
Needs evaluation
|
|
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | Low |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
References
Other references
- https://github.com/pion/dtls/security/advisories/GHSA-cx94-mrg9-rq4j
- https://github.com/pion/dtls/commit/a6397ff7282bc56dc37a68ea9211702edb4de1de (v2.1.4)
- https://github.com/pion/dtls/releases/tag/v2.1.4
- https://github.com/pion/dtls/commit/a6397ff7282bc56dc37a68ea9211702edb4de1de
- https://www.cve.org/CVERecord?id=CVE-2022-29189