CVE-2022-29222
Publication date 21 May 2022
Last updated 19 January 2026
Ubuntu priority
Cvss 3 Severity Score
Description
Pion DTLS is a Go implementation of Datagram Transport Layer Security. Prior to version 2.1.5, a DTLS Client could provide a Certificate that it doesn't posses the private key for and Pion DTLS wouldn't reject it. This issue affects users that are using Client certificates only. The connection itself is still secure. The Certificate provided by clients can't be trusted when using a Pion DTLS server prior to version 2.1.5. Users should upgrade to version 2.1.5 to receive a patch. There are currently no known workarounds.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| snowflake | 25.10 questing |
Not affected
|
| 24.04 LTS noble |
Not affected
|
|
| 22.04 LTS jammy |
Fixed 1.1.0-2ubuntu0.1+esm2
|
|
| telegraf | 25.10 questing | Not in release |
| 24.04 LTS noble | Not in release | |
| 22.04 LTS jammy |
Fixed 1.21.4+ds1-0ubuntu2+esm2
|
|
| pion | 18.04 LTS bionic |
Not affected
|
| 16.04 LTS xenial |
Not affected
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu Pro 30-day free trialSeverity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | High |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | High |
| Availability impact | None |
| Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-7966-1
- Snowflake vulnerabilities
- 19 January 2026
- USN-7966-2
- Telegraf vulnerabilities
- 19 January 2026
Other references
- https://github.com/pion/dtls/security/advisories/GHSA-w45j-f832-hxvh
- https://github.com/pion/dtls/commit/d2f797183a9f044ce976e6df6f362662ca722412 (v2.1.5)
- https://github.com/pion/dtls/releases/tag/v2.1.5
- https://github.com/pion/dtls/commit/d2f797183a9f044ce976e6df6f362662ca722412
- https://www.cve.org/CVERecord?id=CVE-2022-29222