Improper Input Validation The advisory has been revoked - it doesn't affect any version of package github.com/chirpstack/chirpstack-gateway-bridge/packaging/vendor/kerlink/keros-gws/files Open this link in a new tab


    Threat Intelligence

    EPSS 0.04% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMCHIRPSTACKCHIRPSTACKGATEWAYBRIDGEPACKAGINGVENDORKERLINKKEROSGWSFILES-6483251
  • published 24 Mar 2024
  • disclosed 21 Mar 2024
  • credit Unknown

How to fix?

Upgrade github.com/chirpstack/chirpstack-gateway-bridge/packaging/vendor/kerlink/keros-gws/files to version 4.0.11 or higher.

Amendment

This was deemed not a vulnerability.

Overview

Affected versions of this package are vulnerable to Improper Input Validation due to the improper handling of TCP packets when a connection is not in the ESTABLISHED state. An attacker can bypass security restrictions by sending specially crafted TCP packets to exploit this issue.

References