Improper Handling of Exceptional Conditions Affecting matrix-synapse package, versions <1.63.0-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.13% (49th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-MATRIXSYNAPSE-5883077
  • published3 Sept 2022
  • disclosed2 Sept 2022

Introduced: 2 Sep 2022

CVE-2022-31152  (opens in a new tab)
CWE-755  (opens in a new tab)

How to fix?

Upgrade Debian:13 matrix-synapse to version 1.63.0-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream matrix-synapse package and not the matrix-synapse package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. The Matrix specification specifies a list of event authorization rules which must be checked when determining if an event should be accepted into a room. In versions of Synapse up to and including version 1.61.0, some of these rules are not correctly applied. An attacker could craft events which would be accepted by Synapse but not a spec-conformant server, potentially causing divergence in the room state between servers. Administrators of homeservers with federation enabled are advised to upgrade to version 1.62.0 or higher. Federation can be disabled by setting federation_domain_whitelist to an empty list ([]) as a workaround.

CVSS Scores

version 3.1