summary refs log tree commit diff
path: root/docker
diff options
context:
space:
mode:
authorSean Quah <seanq@element.io>2021-11-23 12:39:09 +0000
committerSean Quah <seanq@element.io>2021-11-23 12:39:09 +0000
commitfcb944179192ff51b00e846b06755648c527de7d (patch)
tree042a8abbeada32190528249ea9e46690c5ac4243 /docker
parentMerge remote-tracking branch 'origin/release-v1.47' (diff)
parentAdd CVE number (diff)
downloadsynapse-fcb944179192ff51b00e846b06755648c527de7d.tar.xz
Merge tag 'v1.47.1'
Synapse 1.47.1 (2021-11-23)
===========================

This release fixes a security issue in the media store, affecting all prior releases of Synapse. Server administrators are encouraged to update Synapse as soon as possible. We are not aware of these vulnerabilities being exploited in the wild.

Server administrators who are unable to update Synapse may use the workarounds described in the linked GitHub Security Advisory below.

Security advisory
-----------------

The following issue is fixed in 1.47.1.

- **[GHSA-3hfw-x7gx-437c](https://github.com/matrix-org/synapse/security/advisories/GHSA-3hfw-x7gx-437c) / [CVE-2021-41281](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41281): Path traversal when downloading remote media.**

  Synapse instances with the media repository enabled can be tricked into downloading a file from a remote server into an arbitrary directory, potentially outside the media store directory.

  The last two directories and file name of the path are chosen randomly by Synapse and cannot be controlled by an attacker, which limits the impact.

  Homeservers with the media repository disabled are unaffected. Homeservers configured with a federation whitelist are also unaffected.

  Fixed by [91f2bd090](https://github.com/matrix-org/synapse/commit/91f2bd090).
Diffstat (limited to 'docker')
0 files changed, 0 insertions, 0 deletions