{"id":"GO-2022-0460","summary":"Infinite loop in github.com/pion/dtls/v2","details":"An attacker can send packets that send the DTLS server or client into an infinite loop.","aliases":["CVE-2022-29190","GHSA-cm8f-h6j3-p25c"],"modified":"2026-03-17T04:19:33.647855Z","published":"2022-07-01T20:07:34Z","database_specific":{"review_status":"REVIEWED","url":"https://pkg.go.dev/vuln/GO-2022-0460"},"references":[{"type":"FIX","url":"https://github.com/pion/dtls/commit/e0b2ce3592e8e7d73713ac67b363a2e192a4cecf"}],"affected":[{"package":{"name":"github.com/pion/dtls/v2","ecosystem":"Go","purl":"pkg:golang/github.com/pion/dtls/v2"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2.1.4"}]}],"ecosystem_specific":{"imports":[{"path":"github.com/pion/dtls/v2","symbols":["Client","ClientWithContext","Dial","DialWithContext","Resume","Server","ServerWithContext","fragmentBuffer.pop","handshakeFSM.Run","listener.Accept"]}]},"database_specific":{"source":"https://vuln.go.dev/ID/GO-2022-0460.json"}}],"schema_version":"1.7.5"}