-
CVSS Score
-The commit e0b2ce3 shows a critical modification in fragment_buffer.go where a 'FragmentLength != 0' check was added to prevent infinite loops. The associated test case in fragment_buffer_test.go demonstrates handling of zero-length fragments that previously caused infinite processing. The CWE-835 classification and vulnerability description directly match this code pattern where malformed DTLS fragments could keep the loop running indefinitely by never reaching the exit condition.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/pion/dtls | go | < 2.1.4 | 2.1.4 |
| github.com/pion/dtls/v2 | go | < 2.1.4 | 2.1.4 |
Ongoing coverage of React2Shell