Allocation of Resources Without Limits or Throttling Affecting matrix-synapse package, versions <1.94.0-1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-MATRIXSYNAPSE-5953352
- published 11 Oct 2023
- disclosed 10 Oct 2023
Introduced: 10 Oct 2023
CVE-2023-45129 Open this link in a new tabHow to fix?
Upgrade Debian:unstable matrix-synapse to version 1.94.0-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream matrix-synapse package and not the matrix-synapse package as distributed by Debian.
See How to fix? for Debian:unstable relevant fixed versions and status.
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. Prior to version 1.94.0, a malicious server ACL event can impact performance temporarily or permanently leading to a persistent denial of service. Homeservers running on a closed federation (which presumably do not need to use server ACLs) are not affected. Server administrators are advised to upgrade to Synapse 1.94.0 or later. As a workaround, rooms with malicious server ACL events can be purged and blocked using the admin API.
References
- https://security-tracker.debian.org/tracker/CVE-2023-45129
- https://github.com/matrix-org/synapse/pull/16360
- https://github.com/matrix-org/synapse/security/advisories/GHSA-5chr-wjw5-3gq4
- https://matrix-org.github.io/synapse/latest/admin_api/rooms.html#version-2-new-version
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WRO4MPQ6HOXIUZM6RJP6VTCTMV7RD2T3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEVRB4MG5UXQ5RLZHSUJXM5GWEBYYS5B/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/
- https://security.gentoo.org/glsa/202401-12