fix(deps): update module github.com/pion/dtls/v2 to v2.2.4 [security] #680
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
v2.1.3
->v2.2.4
GitHub Vulnerability Alerts
GHSA-hxp2-xqf3-v83h
Impact
When attempting to unmarshal a Server Hello request we could attempt to unmarshal into a buffer that was too small. This could result in a panic leading the program to crash.
This issue could be abused to cause a denial of service.
Workaround
None
GHSA-4xgv-j62q-h3rj
Impact
During the unmarshalling of a hello verify request we could try to unmarshal into too small a buffer. is could result in a panic leading the program to crash.
This issue could be abused to cause a denial of service.
Workaround
None, upgrade to 2.2.4
CVE-2022-29189
Impact
A buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or times out. An attacker could exploit this to cause excessive memory usage.
Patches
Upgrade to Pion DTLS v2.1.4
Workarounds
No workarounds available, upgrade to Pion DTLS v2.1.4
References
Thank you to Juho Nurminen and the Mattermost team for discovering and reporting this.
For more information
If you have any questions or comments about this advisory:
CVE-2022-29190
Impact
An attacker can send packets that will send Pion DTLS into an infinite loop when processing.
Patches
Upgrade to Pion DTLS v2.1.4
Workarounds
No workarounds available, upgrade to Pion DTLS v2.1.4
References
Thank you to Juho Nurminen and the Mattermost team for discovering and reporting this.
For more information
If you have any questions or comments about this advisory:
CVE-2022-29222
Impact
A DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it.
This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can't be trusted when using a Pion DTLS server prior to v2.1.5
Patches
Upgrade to Pion DTLS v2.1.5
Workarounds
No workarounds available, upgrade to Pion DTLS v2.1.5
References
Thank you to Juho Nurminen and the Mattermost team for discovering and reporting this.
For more information
If you have any questions or comments about this advisory:
Release Notes
pion/dtls
v2.2.4
Compare Source
Security
This release contains 2 patches by @nerd2 from Motorola Solutions that could lead to panics at runtime. We'd like to thank Sam for finding and responsibly disclosing the vulnerabilities to @pion/security.
Changelog
9e922d5
Add fuzz tests for handshakea50d26c
Fix panic unmarshalling hello verify request7a14903
Fix OOB read in server hellov2.2.3
Compare Source
Changelog
8b8bc87
Update module github.com/pion/udp to v0.1.4v2.2.2
Compare Source
Changelog
0473adf
Add SkipHelloVerify option to dTLS11ea8c2
Update module golang.org/x/crypto to v0.5.0f3c7b2d
Update module golang.org/x/net to v0.5.03dca8e4
Update github.com/pion/transport to v23606b0d
Use Go's built-in fuzzing tool instead of go-fuzzb122250
Update CI configs to v0.10.36aaf97c
Fix fuzzing of recordLayer3a6f531
Update CI configs to v0.10.1d0f27fe
Update module github.com/pion/udp to v0.1.2205e480
Update CI configs to v0.9.0f40c61d
Update hash name check to be case insensitive3026357
Update module golang.org/x/crypto to v0.4.008c3602
Update module golang.org/x/net to v0.4.05e7f90f
Update CI configs to v0.8.1c21afb8
Ignore lint error on Subjects() deprecation0b11454
Update module golang.org/x/crypto to v0.3.0265bf7a
Update module golang.org/x/net to v0.2.0f4896b5
Update module github.com/pion/transport to v0.14.11209570
Update module github.com/pion/transport to v0.14.08eed8ed
Update module golang.org/x/crypto to v0.1.04ae7e13
Update CI configs to v0.8.0984d41b
Update golang.org/x/net digest to107f3e3
aabc687
Update golang.org/x/crypto digest toeccd636
4f8fa1e
Update golang.org/x/crypto digest toc86fa9a
980895f
Update golang.org/x/net digest to83b083e
a04cfcc
Implement GetCertificate and GetClientCertificate43968a2
Close connection when handshake timeout occursb8ebc62
Set e2e/Dockerfile to golang:1.18-bullseye82c1271
Implement VerifyConnection as is in tls.Configde299f5
Make the Elliptic curves and order configurable66ec820
Update golang.org/x/net digest to69896b7
194c03a
Update golang.org/x/crypto digest to0559593
0dd0f95
Update module github.com/pion/transport to v0.13.10d729a7
Update golang.org/x/net digest toc960675
4589ddf
Update golang.org/x/crypto digest to793ad66
fa5afe3
Update CI configs to v0.7.102d27879
Fix KeyUsage on x509 template74571b5
Fix CertificateVerify fored25519
89cd8ae
Update CI configs to v0.7.984b65ad
Update CI configs to v0.7.810d3c06
Consolidate signaturehash tests189d384
EnableED25519
E2E testsba33f3d
Use full image referencev2.2.1
Compare Source
Changelog
0473adf
Add SkipHelloVerify option to dTLS11ea8c2
Update module golang.org/x/crypto to v0.5.0f3c7b2d
Update module golang.org/x/net to v0.5.03dca8e4
Update github.com/pion/transport to v23606b0d
Use Go's built-in fuzzing tool instead of go-fuzzb122250
Update CI configs to v0.10.36aaf97c
Fix fuzzing of recordLayer3a6f531
Update CI configs to v0.10.1d0f27fe
Update module github.com/pion/udp to v0.1.2205e480
Update CI configs to v0.9.0f40c61d
Update hash name check to be case insensitive3026357
Update module golang.org/x/crypto to v0.4.008c3602
Update module golang.org/x/net to v0.4.05e7f90f
Update CI configs to v0.8.1c21afb8
Ignore lint error on Subjects() deprecation0b11454
Update module golang.org/x/crypto to v0.3.0265bf7a
Update module golang.org/x/net to v0.2.0f4896b5
Update module github.com/pion/transport to v0.14.11209570
Update module github.com/pion/transport to v0.14.08eed8ed
Update module golang.org/x/crypto to v0.1.04ae7e13
Update CI configs to v0.8.0984d41b
Update golang.org/x/net digest to107f3e3
aabc687
Update golang.org/x/crypto digest toeccd636
4f8fa1e
Update golang.org/x/crypto digest toc86fa9a
980895f
Update golang.org/x/net digest to83b083e
a04cfcc
Implement GetCertificate and GetClientCertificate43968a2
Close connection when handshake timeout occursb8ebc62
Set e2e/Dockerfile to golang:1.18-bullseye82c1271
Implement VerifyConnection as is in tls.Configde299f5
Make the Elliptic curves and order configurable66ec820
Update golang.org/x/net digest to69896b7
194c03a
Update golang.org/x/crypto digest to0559593
0dd0f95
Update module github.com/pion/transport to v0.13.10d729a7
Update golang.org/x/net digest toc960675
4589ddf
Update golang.org/x/crypto digest to793ad66
fa5afe3
Update CI configs to v0.7.102d27879
Fix KeyUsage on x509 template74571b5
Fix CertificateVerify fored25519
89cd8ae
Update CI configs to v0.7.984b65ad
Update CI configs to v0.7.810d3c06
Consolidate signaturehash tests189d384
EnableED25519
E2E testsba33f3d
Use full image referencev2.2.0
Compare Source
Changelog
5f48042
Use Go's built-in fuzzing tool instead of go-fuzzb122250
Update CI configs to v0.10.36aaf97c
Fix fuzzing of recordLayer3a6f531
Update CI configs to v0.10.1d0f27fe
Update module github.com/pion/udp to v0.1.2205e480
Update CI configs to v0.9.0f40c61d
Update hash name check to be case insensitive3026357
Update module golang.org/x/crypto to v0.4.008c3602
Update module golang.org/x/net to v0.4.05e7f90f
Update CI configs to v0.8.1c21afb8
Ignore lint error on Subjects() deprecation0b11454
Update module golang.org/x/crypto to v0.3.0265bf7a
Update module golang.org/x/net to v0.2.0f4896b5
Update module github.com/pion/transport to v0.14.11209570
Update module github.com/pion/transport to v0.14.08eed8ed
Update module golang.org/x/crypto to v0.1.04ae7e13
Update CI configs to v0.8.0984d41b
Update golang.org/x/net digest to107f3e3
aabc687
Update golang.org/x/crypto digest toeccd636
4f8fa1e
Update golang.org/x/crypto digest toc86fa9a
980895f
Update golang.org/x/net digest to83b083e
a04cfcc
Implement GetCertificate and GetClientCertificate43968a2
Close connection when handshake timeout occursb8ebc62
Set e2e/Dockerfile to golang:1.18-bullseye82c1271
Implement VerifyConnection as is in tls.Configde299f5
Make the Elliptic curves and order configurable66ec820
Update golang.org/x/net digest to69896b7
194c03a
Update golang.org/x/crypto digest to0559593
0dd0f95
Update module github.com/pion/transport to v0.13.10d729a7
Update golang.org/x/net digest toc960675
4589ddf
Update golang.org/x/crypto digest to793ad66
fa5afe3
Update CI configs to v0.7.102d27879
Fix KeyUsage on x509 template74571b5
Fix CertificateVerify fored25519
89cd8ae
Update CI configs to v0.7.984b65ad
Update CI configs to v0.7.810d3c06
Consolidate signaturehash tests189d384
EnableED25519
E2E testsba33f3d
Use full image referencev2.1.5
Compare Source
This release includes fixes for a security issue reported by the Mattermost security team. We'd like to thank them for the responsible disclosure and urge any consumers of the DTLS package to update.
v2.1.4
Compare Source
This release includes fixes for two security issues reported by the Mattermost security team. We'd like to thank them for the responsible disclosure and urge any consumers of the DTLS package to update.
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.