ALT-PU-2023-4748-3
Package matrix-synapse updated to version 1.89.0-alt1 for branch sisyphus in task 326444.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-31052
Synapse is an open source home server implementation for the Matrix chat network. In versions prior to 1.61.1 URL previews of some web pages can exhaust the available stack space for the Synapse process due to unbounded recursion. This is sometimes recoverable and leads to an error for the request causing the problem, but in other cases the Synapse process may crash altogether. It is possible to exploit this maliciously, either by malicious users on the homeserver, or by remote users sending URLs that a local user's client may automatically request a URL preview for. Remote users are not able to exploit this directly, because the URL preview endpoint is authenticated. Deployments with `url_preview_enabled: false` set in configuration are not affected. Deployments with `url_preview_enabled: true` set in configuration **are** affected. Deployments with no configuration value set for `url_preview_enabled` are not affected, because the default is `false`. Administrators of homeservers with URL previews enabled are advised to upgrade to v1.61.1 or higher. Users unable to upgrade should set `url_preview_enabled` to false.
- https://github.com/matrix-org/synapse/commit/fa1308061802ac7b7d20e954ba7372c5ac292333
- https://github.com/matrix-org/synapse/commit/fa1308061802ac7b7d20e954ba7372c5ac292333
- https://github.com/matrix-org/synapse/security/advisories/GHSA-22p3-qrh9-cx32
- https://github.com/matrix-org/synapse/security/advisories/GHSA-22p3-qrh9-cx32
- FEDORA-2022-45bf6d4b88
- FEDORA-2022-45bf6d4b88
- FEDORA-2022-1a2312e4d6
- FEDORA-2022-1a2312e4d6
- https://spec.matrix.org/v1.2/client-server-api/#get_matrixmediav3preview_url
- https://spec.matrix.org/v1.2/client-server-api/#get_matrixmediav3preview_url
Modified: 2024-11-21
CVE-2022-31152
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. The Matrix specification specifies a list of [event authorization rules](https://spec.matrix.org/v1.2/rooms/v9/#authorization-rules) which must be checked when determining if an event should be accepted into a room. In versions of Synapse up to and including version 1.61.0, some of these rules are not correctly applied. An attacker could craft events which would be accepted by Synapse but not a spec-conformant server, potentially causing divergence in the room state between servers. Administrators of homeservers with federation enabled are advised to upgrade to version 1.62.0 or higher. Federation can be disabled by setting [`federation_domain_whitelist`](https://matrix-org.github.io/synapse/latest/usage/configuration/config_documentation.html#federation_domain_whitelist) to an empty list (`[]`) as a workaround.
- https://github.com/matrix-org/synapse/pull/13087
- https://github.com/matrix-org/synapse/pull/13087
- https://github.com/matrix-org/synapse/pull/13088
- https://github.com/matrix-org/synapse/pull/13088
- https://github.com/matrix-org/synapse/releases/tag/v1.62.0
- https://github.com/matrix-org/synapse/releases/tag/v1.62.0
- https://github.com/matrix-org/synapse/security/advisories/GHSA-jhjh-776m-4765
- https://github.com/matrix-org/synapse/security/advisories/GHSA-jhjh-776m-4765
Modified: 2024-11-21
CVE-2022-39335
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. The Matrix Federation API allows remote homeservers to request the authorization events in a room. This is necessary so that a homeserver receiving some events can validate that those events are legitimate and permitted in their room. However, in versions of Synapse up to and including 1.68.0, a Synapse homeserver answering a query for authorization events does not sufficiently check that the requesting server should be able to access them. The issue was patched in Synapse 1.69.0. Homeserver administrators are advised to upgrade.
- https://github.com/matrix-org/synapse/issues/13288
- https://github.com/matrix-org/synapse/issues/13288
- https://github.com/matrix-org/synapse/pull/13823
- https://github.com/matrix-org/synapse/pull/13823
- https://github.com/matrix-org/synapse/security/advisories/GHSA-45cj-f97f-ggwv
- https://github.com/matrix-org/synapse/security/advisories/GHSA-45cj-f97f-ggwv
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2MBNMZAFY4RCZL2VGBGAPKGB4JUPZVS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T2MBNMZAFY4RCZL2VGBGAPKGB4JUPZVS/
Modified: 2025-02-13
CVE-2023-32323
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. A malicious user on a Synapse homeserver X with permission to create certain state events can disable outbound federation from X to an arbitrary homeserver Y. Synapse instances with federation disabled are not affected. In versions of Synapse up to and including 1.73, Synapse did not limit the size of `invite_room_state`, meaning that it was possible to create an arbitrarily large invite event. Synapse 1.74 refuses to create oversized `invite_room_state` fields. Server operators should upgrade to Synapse 1.74 or newer urgently.
- https://github.com/matrix-org/synapse/issues/14492
- https://github.com/matrix-org/synapse/issues/14492
- https://github.com/matrix-org/synapse/pull/14642
- https://github.com/matrix-org/synapse/pull/14642
- https://github.com/matrix-org/synapse/security/advisories/GHSA-f3wc-3vxv-xmvr
- https://github.com/matrix-org/synapse/security/advisories/GHSA-f3wc-3vxv-xmvr
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIJRP5ZH6B3KGFLHCAKR2IX2Y4Z25QD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIJRP5ZH6B3KGFLHCAKR2IX2Y4Z25QD/
Modified: 2024-11-21
CVE-2023-32682
Synapse is a Matrix protocol homeserver written in Python with the Twisted framework. In affected versions it may be possible for a deactivated user to login when using uncommon configurations. This only applies if any of the following are true: 1. JSON Web Tokens are enabled for login via the `jwt_config.enabled` configuration setting. 2. The local password database is enabled via the `password_config.enabled` and `password_config.localdb_enabled` configuration settings *and* a user's password is updated via an admin API after a user is deactivated. Note that the local password database is enabled by default, but it is uncommon to set a user's password after they've been deactivated. Installations that are configured to only allow login via Single Sign-On (SSO) via CAS, SAML or OpenID Connect (OIDC); or via an external password provider (e.g. LDAP) are not affected. If not using JSON Web Tokens, ensure that deactivated users do not have a password set. This issue has been addressed in version 1.85.0. Users are advised to upgrade.
- https://github.com/matrix-org/synapse/pull/15624
- https://github.com/matrix-org/synapse/pull/15634
- https://github.com/matrix-org/synapse/security/advisories/GHSA-26c5-ppr8-f33p
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6DH5A5YEB5LRIPP32OUW25FCGZFCZU2/
- https://matrix-org.github.io/synapse/latest/admin_api/user_admin_api.html#create-or-modify-account
- https://matrix-org.github.io/synapse/latest/jwt.html
- https://matrix-org.github.io/synapse/latest/usage/configuration/config_documentation.html#password_config
- https://github.com/matrix-org/synapse/pull/15624
- https://matrix-org.github.io/synapse/latest/usage/configuration/config_documentation.html#password_config
- https://matrix-org.github.io/synapse/latest/jwt.html
- https://matrix-org.github.io/synapse/latest/admin_api/user_admin_api.html#create-or-modify-account
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6DH5A5YEB5LRIPP32OUW25FCGZFCZU2/
- https://github.com/matrix-org/synapse/security/advisories/GHSA-26c5-ppr8-f33p
- https://github.com/matrix-org/synapse/pull/15634
Modified: 2024-11-21
CVE-2023-32683
Synapse is a Matrix protocol homeserver written in Python with the Twisted framework. A discovered oEmbed or image URL can bypass the `url_preview_url_blacklist` setting potentially allowing server side request forgery or bypassing network policies. Impact is limited to IP addresses allowed by the `url_preview_ip_range_blacklist` setting (by default this only allows public IPs) and by the limited information returned to the client: 1. For discovered oEmbed URLs, any non-JSON response or a JSON response which includes non-oEmbed information is discarded. 2. For discovered image URLs, any non-image response is discarded. Systems which have URL preview disabled (via the `url_preview_enabled` setting) or have not configured a `url_preview_url_blacklist` are not affected. This issue has been addressed in version 1.85.0. Users are advised to upgrade. User unable to upgrade may also disable URL previews.
- https://github.com/matrix-org/synapse/pull/15601
- https://github.com/matrix-org/synapse/security/advisories/GHSA-98px-6486-j7qc
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6DH5A5YEB5LRIPP32OUW25FCGZFCZU2/
- https://github.com/matrix-org/synapse/pull/15601
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6DH5A5YEB5LRIPP32OUW25FCGZFCZU2/
- https://github.com/matrix-org/synapse/security/advisories/GHSA-98px-6486-j7qc