Improper Input Validation Affecting matrix-synapse package, versions <1.74.0-1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-MATRIXSYNAPSE-5603640
- published 27 May 2023
- disclosed 26 May 2023
Introduced: 26 May 2023
CVE-2023-32323 Open this link in a new tabHow to fix?
Upgrade Debian:unstable matrix-synapse to version 1.74.0-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream matrix-synapse package and not the matrix-synapse package as distributed by Debian.
See How to fix? for Debian:unstable relevant fixed versions and status.
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. A malicious user on a Synapse homeserver X with permission to create certain state events can disable outbound federation from X to an arbitrary homeserver Y. Synapse instances with federation disabled are not affected. In versions of Synapse up to and including 1.73, Synapse did not limit the size of invite_room_state, meaning that it was possible to create an arbitrarily large invite event. Synapse 1.74 refuses to create oversized invite_room_state fields. Server operators should upgrade to Synapse 1.74 or newer urgently.
References
- https://security-tracker.debian.org/tracker/CVE-2023-32323
- https://github.com/matrix-org/synapse/issues/14492
- https://github.com/matrix-org/synapse/pull/14642
- https://github.com/matrix-org/synapse/security/advisories/GHSA-f3wc-3vxv-xmvr
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJIJRP5ZH6B3KGFLHCAKR2IX2Y4Z25QD/