CVE-2022-29189

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-29189
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-29189.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-29189
Aliases
Downstream
Published
2022-05-20T23:55:16Z
Modified
2025-11-19T10:59:59.046553Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
Buffer for inbound DTLS fragments has no limit
Details

Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.4, a buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or timed out. An attacker could exploit this to cause excessive memory usage. Version 2.1.4 contains a patch for this issue. There are currently no known workarounds available.

Database specific
{
    "cwe_ids": [
        "CWE-120"
    ]
}
References

Affected packages

Git / github.com/pion/dtls

Affected ranges

Type
GIT
Repo
https://github.com/pion/dtls
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.0.0
v1.0.1
v1.0.2
v1.1.0
v1.1.1
v1.2.1
v1.2.2
v1.2.3
v1.3.0
v1.3.1
v1.3.2
v1.3.3
v1.3.4
v1.3.5
v1.4.0
v1.5.0
v1.5.1
v1.5.2
v1.5.3
v1.5.4

v2.*

v2.0.0
v2.0.0-rc.1
v2.0.0-rc.10
v2.0.0-rc.2
v2.0.0-rc.3
v2.0.0-rc.4
v2.0.0-rc.5
v2.0.0-rc.6
v2.0.0-rc.7
v2.0.0-rc.8
v2.0.0-rc.9
v2.0.1
v2.0.10
v2.0.11
v2.0.12
v2.0.13
v2.0.2
v2.0.3
v2.0.4
v2.0.5
v2.0.6
v2.0.7
v2.0.8
v2.0.9
v2.1.0
v2.1.1
v2.1.2
v2.1.3