First published: Tue Oct 10 2023(Updated: )
### Impact A malicious server ACL event can impact performance temporarily or permanently leading to a persistent denial of service. Homeservers running on a closed federation (which presumably do not need to use server ACLs) are not affected. ### Patches Server administrators are advised to upgrade to Synapse 1.94.0 or later. ### Workarounds Rooms with malicious server ACL events can be [purged and blocked](https://matrix-org.github.io/synapse/latest/admin_api/rooms.html#version-2-new-version) using the admin API.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/matrix-synapse | <1.94.0 | 1.94.0 |
Matrix Synapse | <1.94.0 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
<1.94.0 | ||
=37 | ||
=38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45129 is a vulnerability in Synapse, an open-source Matrix homeserver, that can lead to a persistent denial of service due to a malicious server ACL event.
CVE-2023-45129 can temporarily or permanently impact the performance of the server, resulting in a persistent denial of service.
Homeservers running on a closed federation, that do not need to use server ACLs, are not affected by CVE-2023-45129.
CVE-2023-45129 has a severity rating of medium with a CVSS score of 4.9.
To fix CVE-2023-45129, server administrators are advised to upgrade to version 1.94.0 of matrix-synapse.