obs-wormhole
obs-wormhole copied to clipboard
Update module github.com/pion/webrtc/v3 to v3.0.15 [SECURITY]
This PR contains the following updates:
Package | Type | Update | Change |
---|---|---|---|
github.com/pion/webrtc/v3 | require | patch | v3.0.4 -> v3.0.15 |
GitHub Vulnerability Alerts
CVE-2021-28681
Impact
Data channel communication was incorrectly allowed with users who have failed DTLS certificate verification.
This attack requires
- Attacker knows the ICE password.
- Only take place during PeerConnection handshake.
This attack can be detected by monitoring PeerConnectionState
in all versions of Pion WebRTC.
Patches
Users should upgrade to v3.0.15.
The exact patch is https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2e
Workarounds
Users should listen for when PeerConnectionState
changes to PeerConnectionStateFailed
. When it enters this state users should not continue using the PeerConnection.
For more information
If you have any questions or comments about this advisory:
- Open an issue in https://github.com/pion/webrtc
- Email us at [email protected]
Thank you to https://github.com/Gaukas for discovering this.
Release Notes
pion/webrtc (github.com/pion/webrtc/v3)
v3.0.15
v3.0.14
v3.0.13
v3.0.12
v3.0.11
v3.0.10
v3.0.9
v3.0.8
v3.0.7
v3.0.6
v3.0.5
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
- [ ] If you want to rebase/retry this PR, check this box
This PR has been generated by Mend Renovate. View repository job log here.