First published: Tue Nov 24 2020(Updated: )
### Impact A denial of service attack against Matrix clients can be exploited by sending an event including invalid JSON data to Synapse. Synapse would relay the data to clients which could crash or hang. Impact is long-lasting if the event is made part of the room state. ### Patches At a minimum #8106 and #8291 must be applied. #7372 and #8124 include additional checks. ### Workarounds There are no known workarounds. ### Upgrading notes If an invalid event is accepted by an earlier Synapse it can become part of the room state and will not be fixed by upgrading Synapse. Redacting the invalid event should avoid clients receiving the invalid event.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Matrix Synapse | <1.20.0 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
pip/matrix-synapse | <1.20.0 | 1.20.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-26890.
The severity of CVE-2020-26890 is high, with a severity value of 7.5.
Matrix Synapse versions up to 1.20.0, Fedora versions 32 and 33 are affected by CVE-2020-26890.
CVE-2020-26890 allows remote attackers to execute a denial of service attack against the federation and common Matrix clients.
To fix CVE-2020-26890, it is recommended to upgrade to Matrix Synapse version 1.20.0 or later.