Improper Input Validation The advisory has been revoked - it doesn't affect any version of package github.com/chirpstack/chirpstack-gateway-bridge/packaging/vendor/kerlink/keros-gws/files Open this link in a new tab
Threat Intelligence
EPSS
0.04% (9th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMCHIRPSTACKCHIRPSTACKGATEWAYBRIDGEPACKAGINGVENDORKERLINKKEROSGWSFILES-6483251
- published 24 Mar 2024
- disclosed 21 Mar 2024
- credit Unknown
Introduced: 21 Mar 2024
CVE-2024-29862 Open this link in a new tabHow to fix?
Upgrade github.com/chirpstack/chirpstack-gateway-bridge/packaging/vendor/kerlink/keros-gws/files
to version 4.0.11 or higher.
Amendment
This was deemed not a vulnerability.
Overview
Affected versions of this package are vulnerable to Improper Input Validation due to the improper handling of TCP packets when a connection is not in the ESTABLISHED state. An attacker can bypass security restrictions by sending specially crafted TCP packets to exploit this issue.