|
|
Log in / Subscribe / Register

Ubuntu alert USN-7444-1 (matrix-synapse)

From:  John Breton <john.breton@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-7444-1] Synapse vulnerabilities
Date:  Tue, 22 Apr 2025 22:02:09 -0400
Message-ID:  <8ea5334b-1a26-4c78-b607-a0513d619c7a@canonical.com>

========================================================================== Ubuntu Security Notice USN-7444-1 April 22, 2025 matrix-synapse vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in Synapse. Software Description: - matrix-synapse: Synapse: Matrix homeserver written in Python/Twisted. Details: It was discovered that Synapse network policies could be bypassed via specially crafted URLs. An attacker could possibly use this issue to bypass authentication mechanisms. (CVE-2023-32683) It was discovered that Synapse exposed cached device information. An attacker could possibly use this issue to gain access to sensitive information. (CVE-2023-43796) It was discovered that Synapse could be tricked into rejecting state changes in rooms. An attacker could possibly use this issue to cause Synapse to stop functioning properly, resulting in a denial of service. This issue was only fixed in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-39374) It was discovered that Synapse stored user credentials in a server's database temporarily. An attacker could possibly use this issue to gain access to sensitive information. This issue was only fixed in Ubuntu 22.04 LTS. (CVE-2023-41335) It was discovered that Synapse could incorrectly respond to server authorization events. An attacker could possibly use this issue to bypass authentication mechanisms. This issue was only fixed in Ubuntu 22.04 LTS. (CVE-2022-39335) It was discovered that Synapse could be manipulated to mark messages as read when they had not been viewed. An attacker could possibly use this issue to perform repudiation-based attacks. This issue was only fixed in Ubuntu 22.04 LTS. (CVE-2023-42453) It was discovered that Synapse had several memory-related issues. An attacker could possibly use this issue to cause Synapse to crash, resulting in a denial of service. This issue was only fixed in Ubuntu 22.04 LTS. (CVE-2024-31208) It was discovered that Synapse could run external tools due to a unchecked thumbnail rendering routine. An attacker could possibly use this issue to cause Synapse to crash, resulting in a denial of service, or execute arbitrary code. This issue was only fixed in Ubuntu 22.04 LTS. (CVE-2024-53863) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS   matrix-synapse                  1.53.0-1ubuntu0.1~esm2                                   Available with Ubuntu Pro Ubuntu 20.04 LTS   matrix-synapse                  1.11.0-1ubuntu0.1~esm2                                   Available with Ubuntu Pro Ubuntu 18.04 LTS   matrix-synapse                  0.24.0+dfsg-1ubuntu0.1~esm4                                   Available with Ubuntu Pro After a standard system update you need to restart Synapse to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7444-1   CVE-2022-39335, CVE-2022-39374, CVE-2023-32683, CVE-2023-41335,   CVE-2023-42453, CVE-2023-43796, CVE-2024-31208, CVE-2024-53863


Attachment: OpenPGP_signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- wsF5BAABCAAjFiEEyMDHOTG0YH5UsajI8pSCVQZYHygFAmgISiEFAwAAAAAACgkQ8pSCVQZYHyjL ZA/8DUUnD2KNSLwEFcCNpB1qtmHptuYjYy+bNaLwYXWt6vVjO308RcAa/AGkzRQVgfNEg1h4pOKq zkTLjrlNn9Rndl78uR6dLXSYKgSR0xIPnxnGU8LiyiUtAFnvjNh/K88AyWyyGjLfkWNo1YPBob0U ZEJMKmsPbMZqfS33/ueAN4OMYvbaBgKC7a7s7vXRnAyXp+n3FZf86CuYACivr82c0FLEiShnQecx eRTlhH5qrtaiu4gCEKqflQ3zbYWg90PURxJzO/ggHIaRDxvWhQqvhekPc2wfnkiyiU5bMm17vwwg sbeot93U689ezOAjRXrwhG7378uQl9weyPO+qcZJhEQwh4ctH1wiqB8B4P/NJA7ElDmUSIKy6Z6O gM5bJxhO5jKZfAldRo7Ys5bYgRRzcR5zivtWTWYmHDNnDbbP9eMjvnwRTfkBJ2YuPDFaiQvc6owv pLSoesgyx2g3oGB3SO6GZqMO3isY2sgbOVB0M9iP1WcoZi8Lz7QlvNiHC7Dc3BEAYYhjqV09ZECr pnU97WUCBe3vliT3yhPYWUf8PxZFTb6HBaXyIJMVXB47cpuiJelYQK87RHK5MGg2cw3hB7+VMwSf tk7gNa8cvFvfGJ51COm9Cwwq6Dt5X7wuBh7M2UnPK3BOA/fnQ6U+vPIZZzJSewWcIh8mk2Rr8MEy gyU= =uE3n -----END PGP SIGNATURE-----


Attachment: None (type=text/plain)


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds