summary refs log tree commit diff
tag namev1.61.1 (a73970315aa73944904399e78ac8957a0f2cbec6)
tag date2022-06-28 14:46:30 +0100
tagged byAndrew Morgan <andrewm@element.io>
tagged objectcommit 09d89ddc1f...
downloadsynapse-1.61.1.tar.xz
Synapse 1.61.1 (2022-06-28)
===========================

This patch release fixes a security issue regarding URL previews, affecting all prior versions of Synapse. Server administrators are encouraged to update Synapse as soon as possible. We are not aware of these vulnerabilities being exploited in the wild.

Server administrators who are unable to update Synapse may use the workarounds described in the linked GitHub Security Advisory below.

The following issue is fixed in 1.61.1.

* [GHSA-22p3-qrh9-cx32](https://github.com/matrix-org/synapse/security/advisories/GHSA-22p3-qrh9-cx32) / [CVE-2022-31052](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31052)

  Synapse instances with the [`url_preview_enabled`](https://matrix-org.github.io/synapse/v1.61/usage/configuration/config_documentation.html#media-store) homeserver config option set to `true` are affected. URL previews of some web pages can lead to unbounded recursion, causing the request to either fail, or in some cases crash the running Synapse process.

  Requesting URL previews requires authentication. Nevertheless, it is possible to exploit this maliciously, either by malicious users on the homeserver, or by remote users sending URLs that a local user's client may automatically request a URL preview for.

  Homeservers with the `url_preview_enabled` configuration option set to `false` (the default) are unaffected. Instances with the `enable_media_repo` configuration option set to `false` are also unaffected, as this also disables URL preview functionality.

  Fixed by [fa1308061802ac7b7d20e954ba7372c5ac292333](https://github.com/matrix-org/synapse/commit/fa1308061802ac7b7d20e954ba7372c5ac292333).
-----BEGIN PGP SIGNATURE-----
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=5J9/
-----END PGP SIGNATURE-----