summary refs log tree commit diff
path: root/synapse/config/tls.py
diff options
context:
space:
mode:
authorBrendan Abolivier <babolivier@matrix.org>2021-08-31 14:53:42 +0100
committerBrendan Abolivier <babolivier@matrix.org>2021-08-31 14:53:42 +0100
commit72efaa2edd2eaccc457dc72ccefd9da5bef69304 (patch)
tree595a6ada52e10eaccef29aa962cfa3c579e8dd0c /synapse/config/tls.py
parentMerge tag 'v1.33.0' into babolivier/dinsic_1.41.0 (diff)
parentUse link to advisory rather than to the CVE repo (diff)
downloadsynapse-72efaa2edd2eaccc457dc72ccefd9da5bef69304.tar.xz
Merge tag 'v1.33.2' into babolivier/dinsic_1.41.0
Synapse 1.33.2 (2021-05-11)
===========================

Due to the security issue highlighted below, server administrators are encouraged to update Synapse. We are not aware of these vulnerabilities being exploited in the wild.

Security advisory
-----------------

This release fixes a denial of service attack ([CVE-2021-29471](https://github.com/matrix-org/synapse/security/advisories/GHSA-x345-32rc-8h85)) against Synapse's push rules implementation. Server admins are encouraged to upgrade.

Internal Changes
----------------

- Unpin attrs dependency. ([\#9946](https://github.com/matrix-org/synapse/issues/9946))
Diffstat (limited to 'synapse/config/tls.py')
-rw-r--r--synapse/config/tls.py4
1 files changed, 2 insertions, 2 deletions
diff --git a/synapse/config/tls.py b/synapse/config/tls.py

index b041869758..7df4e4c3e6 100644 --- a/synapse/config/tls.py +++ b/synapse/config/tls.py
@@ -17,7 +17,7 @@ import os import warnings from datetime import datetime from hashlib import sha256 -from typing import List, Optional +from typing import List, Optional, Pattern from unpaddedbase64 import encode_base64 @@ -124,7 +124,7 @@ class TlsConfig(Config): fed_whitelist_entries = [] # Support globs (*) in whitelist values - self.federation_certificate_verification_whitelist = [] # type: List[str] + self.federation_certificate_verification_whitelist = [] # type: List[Pattern] for entry in fed_whitelist_entries: try: entry_regex = glob_to_regex(entry.encode("ascii").decode("ascii"))