CVE-2021-29471: Denial of service attack via push rule patterns in matrix-synapse
(updated )
“Push rules” can specify conditions under which they will match, including event_match
, which matches event content against a pattern including wildcards.
Certain patterns can cause very poor performance in the matching engine, leading to a denial-of-service when processing moderate length events.
References
- github.com/advisories/GHSA-x345-32rc-8h85
- github.com/matrix-org/synapse
- github.com/matrix-org/synapse/commit/03318a766cac9f8b053db2214d9c332a977d226c
- github.com/matrix-org/synapse/releases/tag/v1.33.2
- github.com/matrix-org/synapse/security/advisories/GHSA-x345-32rc-8h85
- github.com/pypa/advisory-database/tree/main/vulns/matrix-synapse/PYSEC-2021-135.yaml
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNNAJOZNMVMXM6AS7RFFKB4QLUJ4IFEY
- nvd.nist.gov/vuln/detail/CVE-2021-29471
Detect and mitigate CVE-2021-29471 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →