Advisory Published

USN-7444-1: Synapse vulnerabilities

First published: Tue Apr 22 2025(Updated: )

It was discovered that Synapse network policies could be bypassed via specially crafted URLs. An attacker could possibly use this issue to bypass authentication mechanisms. (CVE-2023-32683) It was discovered that Synapse exposed cached device information. An attacker could possibly use this issue to gain access to sensitive information. (CVE-2023-43796) It was discovered that Synapse could be tricked into rejecting state changes in rooms. An attacker could possibly use this issue to cause Synapse to stop functioning properly, resulting in a denial of service. This issue was only fixed in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-39374) It was discovered that Synapse stored user credentials in a server's database temporarily. An attacker could possibly use this issue to gain access to sensitive information. This issue was only fixed in Ubuntu 22.04 LTS. (CVE-2023-41335) It was discovered that Synapse could incorrectly respond to server authorization events. An attacker could possibly use this issue to bypass authentication mechanisms. This issue was only fixed in Ubuntu 22.04 LTS. (CVE-2022-39335) It was discovered that Synapse could be manipulated to mark messages as read when they had not been viewed. An attacker could possibly use this issue to perform repudiation-based attacks. This issue was only fixed in Ubuntu 22.04 LTS. (CVE-2023-42453) It was discovered that Synapse had several memory-related issues. An attacker could possibly use this issue to cause Synapse to crash, resulting in a denial of service. This issue was only fixed in Ubuntu 22.04 LTS. (CVE-2024-31208) It was discovered that Synapse could run external tools due to a unchecked thumbnail rendering routine. An attacker could possibly use this issue to cause Synapse to crash, resulting in a denial of service, or execute arbitrary code. This issue was only fixed in Ubuntu 22.04 LTS. (CVE-2024-53863)

Affected SoftwareAffected VersionHow to fix
All of
ubuntu/matrix-synapse<1.53.0-1ubuntu0.1~esm2
1.53.0-1ubuntu0.1~esm2
Ubuntu=22.04
All of
ubuntu/matrix-synapse<1.11.0-1ubuntu0.1~esm2
1.11.0-1ubuntu0.1~esm2
Ubuntu=20.04
All of
ubuntu/matrix-synapse<0.24.0+dfsg-1ubuntu0.1~esm4
0.24.0+dfsg-1ubuntu0.1~esm4
Ubuntu=18.04

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of USN-7444-1?

    USN-7444-1 has been classified as a high severity vulnerability due to its potential to bypass authentication mechanisms.

  • How do I fix USN-7444-1?

    To fix USN-7444-1, you should upgrade your matrix-synapse package to the specified remedy versions for your Ubuntu release.

  • What vulnerabilities are addressed in USN-7444-1?

    USN-7444-1 addresses multiple vulnerabilities including CVE-2023-32683 and CVE-2023-41335, among others.

  • Which versions of Ubuntu are affected by USN-7444-1?

    USN-7444-1 affects Ubuntu versions 22.04, 20.04, and 18.04.

  • What can an attacker achieve by exploiting USN-7444-1?

    An attacker exploiting USN-7444-1 could potentially bypass authentication mechanisms and access cached device information.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203