Pion/DTLS contains buffer for inbound DTLS fragments with no limit
Description
Published by the National Vulnerability Database
May 21, 2022
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
May 24, 2022
Last updated
Aug 29, 2023
Impact
A buffer that was used for inbound network traffic had no upper limit. Pion DTLS would buffer all network traffic from the remote user until the handshake completes or times out. An attacker could exploit this to cause excessive memory usage.
Patches
Upgrade to Pion DTLS v2.1.4
Workarounds
No workarounds available, upgrade to Pion DTLS v2.1.4
References
Thank you to Juho Nurminen and the Mattermost team for discovering and reporting this.
For more information
If you have any questions or comments about this advisory:
References