We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Pion Interceptor is a framework for building RTP/RTCP communication software. Versions v0.1.36 through v0.1.38 contain a bug in a RTP packet factory that can be exploited to trigger a panic with Pion based SFU via crafted RTP packets, This only affect users that use pion/interceptor. Users should upgrade to v0.1.39 or later, which validates that: `padLen > 0 && padLen <= payloadLength` and return error on overflow, avoiding panic. If upgrading is not possible, apply the patch from the pull request manually or drop packets whose P-bit is set but whose padLen is zero or larger than the remaining payload.
Reserved 2025-06-02 | Published 2025-06-09 | Updated 2025-06-09 | Assigner GitHub_MCWE-770: Allocation of Resources Without Limits or Throttling
github.com/...ceptor/security/advisories/GHSA-f26w-gh5m-qq77
github.com/pion/webrtc/issues/3148
github.com/pion/interceptor/pull/338
github.com/...ommit/fa5b35ea867389cec33a9c82fffbd459ca8958e5
Support options