Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
matrix-synapse-1.43.0-1.1 on GA media

Notes

Title of the patch
matrix-synapse-1.43.0-1.1 on GA media
Description of the patch
These are all security issues fixed in the matrix-synapse-1.43.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11041
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
   document: {
      aggregate_severity: {
         namespace: "https://www.suse.com/support/security/rating/",
         text: "moderate",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright 2024 SUSE LLC. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "matrix-synapse-1.43.0-1.1 on GA media",
            title: "Title of the patch",
         },
         {
            category: "description",
            text: "These are all security issues fixed in the matrix-synapse-1.43.0-1.1 package on the GA media of openSUSE Tumbleweed.",
            title: "Description of the patch",
         },
         {
            category: "details",
            text: "openSUSE-Tumbleweed-2024-11041",
            title: "Patchnames",
         },
         {
            category: "legal_disclaimer",
            text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
            title: "Terms of use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://www.suse.com/support/security/contact/",
         name: "SUSE Product Security Team",
         namespace: "https://www.suse.com/",
      },
      references: [
         {
            category: "external",
            summary: "SUSE ratings",
            url: "https://www.suse.com/support/security/rating/",
         },
         {
            category: "self",
            summary: "URL of this CSAF notice",
            url: "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11041-1.json",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2018-12291 page",
            url: "https://www.suse.com/security/cve/CVE-2018-12291/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2019-5885 page",
            url: "https://www.suse.com/security/cve/CVE-2019-5885/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-10108 page",
            url: "https://www.suse.com/security/cve/CVE-2020-10108/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-10109 page",
            url: "https://www.suse.com/security/cve/CVE-2020-10109/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-1971 page",
            url: "https://www.suse.com/security/cve/CVE-2020-1971/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-26257 page",
            url: "https://www.suse.com/security/cve/CVE-2020-26257/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2020-26891 page",
            url: "https://www.suse.com/security/cve/CVE-2020-26891/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-29471 page",
            url: "https://www.suse.com/security/cve/CVE-2021-29471/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-3449 page",
            url: "https://www.suse.com/security/cve/CVE-2021-3449/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-39163 page",
            url: "https://www.suse.com/security/cve/CVE-2021-39163/",
         },
         {
            category: "self",
            summary: "SUSE CVE CVE-2021-39164 page",
            url: "https://www.suse.com/security/cve/CVE-2021-39164/",
         },
      ],
      title: "matrix-synapse-1.43.0-1.1 on GA media",
      tracking: {
         current_release_date: "2024-06-15T00:00:00Z",
         generator: {
            date: "2024-06-15T00:00:00Z",
            engine: {
               name: "cve-database.git:bin/generate-csaf.pl",
               version: "1",
            },
         },
         id: "openSUSE-SU-2024:11041-1",
         initial_release_date: "2024-06-15T00:00:00Z",
         revision_history: [
            {
               date: "2024-06-15T00:00:00Z",
               number: "1",
               summary: "Current version",
            },
         ],
         status: "final",
         version: "1",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "matrix-synapse-1.43.0-1.1.aarch64",
                        product: {
                           name: "matrix-synapse-1.43.0-1.1.aarch64",
                           product_id: "matrix-synapse-1.43.0-1.1.aarch64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "aarch64",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "matrix-synapse-1.43.0-1.1.ppc64le",
                        product: {
                           name: "matrix-synapse-1.43.0-1.1.ppc64le",
                           product_id: "matrix-synapse-1.43.0-1.1.ppc64le",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "ppc64le",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "matrix-synapse-1.43.0-1.1.s390x",
                        product: {
                           name: "matrix-synapse-1.43.0-1.1.s390x",
                           product_id: "matrix-synapse-1.43.0-1.1.s390x",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "s390x",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "matrix-synapse-1.43.0-1.1.x86_64",
                        product: {
                           name: "matrix-synapse-1.43.0-1.1.x86_64",
                           product_id: "matrix-synapse-1.43.0-1.1.x86_64",
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "openSUSE Tumbleweed",
                        product: {
                           name: "openSUSE Tumbleweed",
                           product_id: "openSUSE Tumbleweed",
                           product_identification_helper: {
                              cpe: "cpe:/o:opensuse:tumbleweed",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "SUSE Linux Enterprise",
               },
            ],
            category: "vendor",
            name: "SUSE",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "matrix-synapse-1.43.0-1.1.aarch64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
            },
            product_reference: "matrix-synapse-1.43.0-1.1.aarch64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "matrix-synapse-1.43.0-1.1.ppc64le as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
            },
            product_reference: "matrix-synapse-1.43.0-1.1.ppc64le",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "matrix-synapse-1.43.0-1.1.s390x as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
            },
            product_reference: "matrix-synapse-1.43.0-1.1.s390x",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "matrix-synapse-1.43.0-1.1.x86_64 as component of openSUSE Tumbleweed",
               product_id: "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
            },
            product_reference: "matrix-synapse-1.43.0-1.1.x86_64",
            relates_to_product_reference: "openSUSE Tumbleweed",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2018-12291",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2018-12291",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The on_get_missing_events function in handlers/federation.py in Matrix Synapse before 0.31.1 has a security bug in the get_missing_events federation API where event visibility rules were not applied correctly.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2018-12291",
               url: "https://www.suse.com/security/cve/CVE-2018-12291",
            },
            {
               category: "external",
               summary: "SUSE Bug 1096833 for CVE-2018-12291",
               url: "https://bugzilla.suse.com/1096833",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2018-12291",
      },
      {
         cve: "CVE-2019-5885",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2019-5885",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Matrix Synapse before 0.34.0.1, when the macaroon_secret_key authentication parameter is not set, uses a predictable value to derive a secret key and other secrets which could allow remote attackers to impersonate users.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2019-5885",
               url: "https://www.suse.com/security/cve/CVE-2019-5885",
            },
            {
               category: "external",
               summary: "SUSE Bug 1121886 for CVE-2019-5885",
               url: "https://bugzilla.suse.com/1121886",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
                  version: "3.0",
               },
               products: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2019-5885",
      },
      {
         cve: "CVE-2020-10108",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-10108",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In Twisted Web through 19.10.0, there was an HTTP request splitting vulnerability. When presented with two content-length headers, it ignored the first header. When the second content-length value was set to zero, the request body was interpreted as a pipelined request.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-10108",
               url: "https://www.suse.com/security/cve/CVE-2020-10108",
            },
            {
               category: "external",
               summary: "SUSE Bug 1166457 for CVE-2020-10108",
               url: "https://bugzilla.suse.com/1166457",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2020-10108",
      },
      {
         cve: "CVE-2020-10109",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-10109",
            },
         ],
         notes: [
            {
               category: "general",
               text: "In Twisted Web through 19.10.0, there was an HTTP request splitting vulnerability. When presented with a content-length and a chunked encoding header, the content-length took precedence and the remainder of the request body was interpreted as a pipelined request.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-10109",
               url: "https://www.suse.com/security/cve/CVE-2020-10109",
            },
            {
               category: "external",
               summary: "SUSE Bug 1166458 for CVE-2020-10109",
               url: "https://bugzilla.suse.com/1166458",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2020-10109",
      },
      {
         cve: "CVE-2020-1971",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-1971",
            },
         ],
         notes: [
            {
               category: "general",
               text: "The X.509 GeneralName type is a generic type for representing different types of names. One of those name types is known as EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which compares different instances of a GENERAL_NAME to see if they are equal or not. This function behaves incorrectly when both GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and a crash may occur leading to a possible denial of service attack. OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1) Comparing CRL distribution point names between an available CRL and a CRL distribution point embedded in an X509 certificate 2) When verifying that a timestamp response token signer matches the timestamp authority name (exposed via the API functions TS_RESP_verify_response and TS_RESP_verify_token) If an attacker can control both items being compared then that attacker could trigger a crash. For example if the attacker can trick a client or server into checking a malicious certificate against a malicious CRL then this may occur. Note that some applications automatically download CRLs based on a URL embedded in a certificate. This checking happens prior to the signatures on the certificate and CRL being verified. OpenSSL's s_server, s_client and verify tools have support for the \"-crl_download\" option which implements automatic CRL downloading and this attack has been demonstrated to work against those tools. Note that an unrelated bug means that affected versions of OpenSSL cannot parse or construct correct encodings of EDIPARTYNAME. However it is possible to construct a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected by this issue. Other OpenSSL releases are out of support and have not been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-1971",
               url: "https://www.suse.com/security/cve/CVE-2020-1971",
            },
            {
               category: "external",
               summary: "SUSE Bug 1179491 for CVE-2020-1971",
               url: "https://bugzilla.suse.com/1179491",
            },
            {
               category: "external",
               summary: "SUSE Bug 1196179 for CVE-2020-1971",
               url: "https://bugzilla.suse.com/1196179",
            },
            {
               category: "external",
               summary: "SUSE Bug 1199303 for CVE-2020-1971",
               url: "https://bugzilla.suse.com/1199303",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2020-1971",
      },
      {
         cve: "CVE-2020-26257",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-26257",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Matrix is an ecosystem for open federated Instant Messaging and VoIP. Synapse is a reference \"homeserver\" implementation of Matrix. A malicious or poorly-implemented homeserver can inject malformed events into a room by specifying a different room id in the path of a `/send_join`, `/send_leave`, `/invite` or `/exchange_third_party_invite` request. This can lead to a denial of service in which future events will not be correctly sent to other servers over federation. This affects any server which accepts federation requests from untrusted servers. The Matrix Synapse reference implementation before version 1.23.1 the implementation is vulnerable to this injection attack. Issue is fixed in version 1.23.1. As a workaround homeserver administrators could limit access to the federation API to trusted servers (for example via `federation_domain_whitelist`).",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-26257",
               url: "https://www.suse.com/security/cve/CVE-2020-26257",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-26257",
      },
      {
         cve: "CVE-2020-26891",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2020-26891",
            },
         ],
         notes: [
            {
               category: "general",
               text: "AuthRestServlet in Matrix Synapse before 1.21.0 is vulnerable to XSS due to unsafe interpolation of the session GET parameter. This allows a remote attacker to execute an XSS attack on the domain Synapse is hosted on, by supplying the victim user with a malicious URL to the /_matrix/client/r0/auth/*/fallback/web or /_matrix/client/unstable/auth/*/fallback/web Synapse endpoints.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2020-26891",
               url: "https://www.suse.com/security/cve/CVE-2020-26891",
            },
            {
               category: "external",
               summary: "SUSE Bug 1179186 for CVE-2020-26891",
               url: "https://bugzilla.suse.com/1179186",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 6.1,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2020-26891",
      },
      {
         cve: "CVE-2021-29471",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-29471",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.33.2 \"Push rules\" can specify conditions under which they will match, including `event_match`, which matches event content against a pattern including wildcards. Certain patterns can cause very poor performance in the matching engine, leading to a denial-of-service when processing moderate length events. The issue is patched in version 1.33.2. A potential workaround might be to prevent users from making custom push rules, by blocking such requests at a reverse-proxy.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-29471",
               url: "https://www.suse.com/security/cve/CVE-2021-29471",
            },
            {
               category: "external",
               summary: "SUSE Bug 1185947 for CVE-2021-29471",
               url: "https://bugzilla.suse.com/1185947",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "moderate",
            },
         ],
         title: "CVE-2021-29471",
      },
      {
         cve: "CVE-2021-3449",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-3449",
            },
         ],
         notes: [
            {
               category: "general",
               text: "An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS clients are not impacted by this issue. All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k. OpenSSL 1.0.2 is not impacted by this issue. Fixed in OpenSSL 1.1.1k (Affected 1.1.1-1.1.1j).",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-3449",
               url: "https://www.suse.com/security/cve/CVE-2021-3449",
            },
            {
               category: "external",
               summary: "SUSE Bug 1183852 for CVE-2021-3449",
               url: "https://bugzilla.suse.com/1183852",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "important",
            },
         ],
         title: "CVE-2021-3449",
      },
      {
         cve: "CVE-2021-39163",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-39163",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Matrix is an ecosystem for open federated Instant Messaging and Voice over IP. In versions 1.41.0 and prior, unauthorised users can access the name, avatar, topic and number of members of a room if they know the ID of the room. This vulnerability is limited to homeservers where the vulnerable homeserver is in the room and untrusted users are permitted to create groups (communities). By default, only homeserver administrators can create groups. However, homeserver administrators can already access this information in the database or using the admin API. As a result, only homeservers where the configuration setting `enable_group_creation` has been set to `true` are impacted. Server administrators should upgrade to 1.41.1 or higher to patch the vulnerability. There are two potential workarounds. Server administrators can set `enable_group_creation` to `false` in their homeserver configuration (this is the default value) to prevent creation of groups by non-administrators. Administrators that are using a reverse proxy could, with partial loss of group functionality, block the endpoints `/_matrix/client/r0/groups/{group_id}/rooms` and `/_matrix/client/unstable/groups/{group_id}/rooms`.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-39163",
               url: "https://www.suse.com/security/cve/CVE-2021-39163",
            },
            {
               category: "external",
               summary: "SUSE Bug 1190037 for CVE-2021-39163",
               url: "https://bugzilla.suse.com/1190037",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.1,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2021-39163",
      },
      {
         cve: "CVE-2021-39164",
         ids: [
            {
               system_name: "SUSE CVE Page",
               text: "https://www.suse.com/security/cve/CVE-2021-39164",
            },
         ],
         notes: [
            {
               category: "general",
               text: "Matrix is an ecosystem for open federated Instant Messaging and Voice over IP. In versions 1.41.0 and prior, unauthorised users can access the membership (list of members, with their display names) of a room if they know the ID of the room. The vulnerability is limited to rooms with `shared` history visibility. Furthermore, the unauthorised user must be using an account on a vulnerable homeserver that is in the room. Server administrators should upgrade to 1.41.1 or later in order to receive the patch. One workaround is available. Administrators of servers that use a reverse proxy could, with potentially unacceptable loss of functionality, block the endpoints: `/_matrix/client/r0/rooms/{room_id}/members` with `at` query parameter, and `/_matrix/client/unstable/rooms/{room_id}/members` with `at` query parameter.",
               title: "CVE description",
            },
         ],
         product_status: {
            recommended: [
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
               "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
            ],
         },
         references: [
            {
               category: "external",
               summary: "CVE-2021-39164",
               url: "https://www.suse.com/security/cve/CVE-2021-39164",
            },
            {
               category: "external",
               summary: "SUSE Bug 1190038 for CVE-2021-39164",
               url: "https://bugzilla.suse.com/1190038",
            },
         ],
         remediations: [
            {
               category: "vendor_fix",
               details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
               product_ids: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 3.1,
                  baseSeverity: "LOW",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
               products: [
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.aarch64",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.ppc64le",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.s390x",
                  "openSUSE Tumbleweed:matrix-synapse-1.43.0-1.1.x86_64",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               date: "2024-06-15T00:00:00Z",
               details: "low",
            },
         ],
         title: "CVE-2021-39164",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.