UBUNTU-CVE-2022-29222

Source
https://ubuntu.com/security/CVE-2022-29222
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-29222.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2022-29222
Upstream
Downstream
Related
Published
2022-05-21T00:15:00Z
Modified
2026-01-20T17:26:46.839351Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.5, a DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it. This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can't be trusted when using a Pion DTLS server prior to version 2.1.5. Users should upgrade to version 2.1.5 to receive a patch. There are currently no known workarounds.

References

Affected packages

Ubuntu:Pro:22.04:LTS / snowflake

Package

Name
snowflake
Purl
pkg:deb/ubuntu/snowflake@1.1.0-2ubuntu0.1+esm2?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.1.0-2ubuntu0.1+esm2

Affected versions

1.*

1.1.0-1
1.1.0-2
1.1.0-2ubuntu0.1
1.1.0-2ubuntu0.1+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "snowflake-client",
            "binary_version": "1.1.0-2ubuntu0.1+esm2"
        },
        {
            "binary_name": "snowflake-proxy",
            "binary_version": "1.1.0-2ubuntu0.1+esm2"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-29222.json"

Ubuntu:Pro:22.04:LTS / telegraf

Package

Name
telegraf
Purl
pkg:deb/ubuntu/telegraf@1.21.4+ds1-0ubuntu2+esm2?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.21.4+ds1-0ubuntu2+esm2

Affected versions

1.*

1.19.2+ds1-0ubuntu1
1.21.2+ds1-0ubuntu1
1.21.4+ds1-0ubuntu1
1.21.4+ds1-0ubuntu2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "telegraf",
            "binary_version": "1.21.4+ds1-0ubuntu2+esm2"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-29222.json"