git: 8800222e6206 - main - security/vuxml: Document net-im/py-matrix-synapse vulnerability
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Mon, 16 Dec 2024 22:23:52 UTC
The branch main has been updated by ashish: URL: https://cgit.FreeBSD.org/ports/commit/?id=8800222e62060da674235c9ac44e5dbb3d161d5d commit 8800222e62060da674235c9ac44e5dbb3d161d5d Author: Ashish SHUKLA <ashish@FreeBSD.org> AuthorDate: 2024-12-16 22:06:54 +0000 Commit: Ashish SHUKLA <ashish@FreeBSD.org> CommitDate: 2024-12-16 22:13:39 +0000 security/vuxml: Document net-im/py-matrix-synapse vulnerability Signed-off-by: Sascha Biberhofer <sascha.biberhofer@skyforge.at> PR: 283350 Reviewed by: ashish --- security/vuxml/vuln/2024.xml | 47 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 167e83c8ce9a..8e9741134971 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,50 @@ + <vuln vid="71f3e9f0-bafc-11ef-885d-901b0e934d69"> + <topic>py-matrix-synapse -- multiple vulnerabilities in versions prior to 1.120.1</topic> + <affects> + <package> + <name>py38-matrix-synapse</name> + <name>py39-matrix-synapse</name> + <name>py310-matrix-synapse</name> + <name>py311-matrix-synapse</name> + <range><lt>1.120.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>element-hq/synapse developers report:</p> + <blockquote cite="https://github.com/element-hq/synapse/releases/tag/v1.120.2"> + <p>[The 1.120.1] release fixes multiple security + vulnerabilities, some affecting all prior versions of + Synapse. Server administrators are encouraged to + update Synapse as soon as possible. We are not aware + of these vulnerabilities being exploited in the + wild.</p> + <p>Administrators who are unable to update Synapse may + use the workarounds described in the linked GitHub + Security Advisory below.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2024-52805</cvename> + <url>https://github.com/element-hq/synapse/security/advisories/GHSA-rfq8-j7rh-8hf2</url> + <cvename>CVE-2024-52815</cvename> + <url>https://github.com/element-hq/synapse/security/advisories/GHSA-f3r3-h2mq-hx2h</url> + <cvename>CVE-2024-53863</cvename> + <url>https://github.com/element-hq/synapse/security/advisories/GHSA-vp6v-whfm-rv3g</url> + <cvename>CVE-2024-53867</cvename> + <url>https://github.com/element-hq/synapse/security/advisories/GHSA-56w4-5538-8v8h</url> + <cvename>CVE-2024-37302</cvename> + <url>https://github.com/element-hq/synapse/security/advisories/GHSA-4mhg-xv73-xq2x</url> + <cvename>CVE-2024-37303</cvename> + <url>https://github.com/element-hq/synapse/security/advisories/GHSA-gjgr-7834-rhxr</url> + </references> + <dates> + <discovery>2024-12-03</discovery> + <entry>2024-12-15</entry> + </dates> + </vuln> + <vuln vid="ef56065e-81fe-4731-a1e3-606c55925bef"> <topic>zeek -- potential DoS vulnerability</topic> <affects>