From nobody Mon Dec 16 22:23:52 2024 X-Original-To: dev-commits-ports-main@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4YBvc82bnLz5gcP9; Mon, 16 Dec 2024 22:23:52 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R10" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4YBvc823xmz44wD; Mon, 16 Dec 2024 22:23:52 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1734387832; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=OYeaaJmtAqXZbY08Z4VQbcC0dbEA0q3Vx95hofuHpVw=; b=WELpg/co3HV+6ArkKo5UNFgBk0gR/K7E4962K6xUggg77QnHcKxgYnCEfEsvQcwCJDQ/E8 12GkF/G5ntdPFAR3LNrYloXoW+xe2h36yv8PrEdvb2jhTyq04ZwjeRism/POBvlqgKrCxs /olBJIEsXbUXgkHaTfbU9agKufJS3NJNcmfbagJkXT8ltp7EbUQT8pTJDHQ0nGMm9Y5k19 +3t5yXFWujdEEoZN3OaEyL9rQmCn1tNCHinA4IhaSUXEV5+qbbRJi5hwUgMkW4X+V/qnzH zd/gf+7RbROhiDg7AsDcfJVODmGjZyHWz13JFhXF97W54e7pYOw/bWG1lMNYSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1734387832; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=OYeaaJmtAqXZbY08Z4VQbcC0dbEA0q3Vx95hofuHpVw=; b=Iw2WkQeCrACnGfG6ga5qEXm/EncFPTJzvGNbJDabU+5DsDvK/sofh8QXK88eLw6ZcKjLxR Z2lE6Zzi3C2XPX+sOPHSDsavpDbAibweuQljZ4hBgVKWLvWz/BW4MZe0d2uCG+/fiFNbKd QXL5VgvWcPzk9ibDjOA5CuXJXXiiPu8g1ylTluqzcnlrh195ecOmAQHSfPQKWx4HMe5InA gZmcZGN4AdWCIXNW6UmeYwJSouJxBWwHYyvqMLQNSsT4Sag15nH+edX4EB/xceclXiHpdr 9JgYr3koJ5YpT/+wua78BTYYlPGsSPR70yEyMPIcLWB2vSoYLjHMPBprcWKu3A== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1734387832; a=rsa-sha256; cv=none; b=Mqw5V99pWZzp7wHSNlThDIN9hC3lAYw+nPNeH+kAdXockYqTfUbLRUoaWAcS9Eqtd5GVU0 iQ/iRR37OCpsSxaKvhCR00IoFiBBScCIvIVFtDMIWmJb3+d4PKdGNaU7D+dPrDELoxDEb7 rgT1qKU3REGz5ESObOU3fEtYp9DB4L2I4l82pWNttWeCcCFPB6xGl/q/BGyfZ2CrNygCFJ 4t5cGZmCLeNjgA79YAzuS7Jr7OkKi/H9kYwHRaQlTLsgqe43vulE6D/0Efo/+DexTYGLVT bX5675SuT5D3lQ1qC0YCyjfSpbDHjJvLy0ri+1fk0I9rhU0gaiQtfAKJjXHhlg== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4YBvc81gHpz1Bky; Mon, 16 Dec 2024 22:23:52 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.18.1/8.18.1) with ESMTP id 4BGMNqJ5012945; Mon, 16 Dec 2024 22:23:52 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.18.1/8.18.1/Submit) id 4BGMNqh3012942; Mon, 16 Dec 2024 22:23:52 GMT (envelope-from git) Date: Mon, 16 Dec 2024 22:23:52 GMT Message-Id: <202412162223.4BGMNqh3012942@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Ashish SHUKLA Subject: git: 8800222e6206 - main - security/vuxml: Document net-im/py-matrix-synapse vulnerability List-Id: Commits to the main branch of the FreeBSD ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-main List-Help: List-Post: List-Subscribe: List-Unsubscribe: X-BeenThere: dev-commits-ports-main@freebsd.org Sender: owner-dev-commits-ports-main@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: ashish X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 8800222e62060da674235c9ac44e5dbb3d161d5d Auto-Submitted: auto-generated The branch main has been updated by ashish: URL: https://cgit.FreeBSD.org/ports/commit/?id=8800222e62060da674235c9ac44e5dbb3d161d5d commit 8800222e62060da674235c9ac44e5dbb3d161d5d Author: Ashish SHUKLA AuthorDate: 2024-12-16 22:06:54 +0000 Commit: Ashish SHUKLA CommitDate: 2024-12-16 22:13:39 +0000 security/vuxml: Document net-im/py-matrix-synapse vulnerability Signed-off-by: Sascha Biberhofer PR: 283350 Reviewed by: ashish --- security/vuxml/vuln/2024.xml | 47 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) diff --git a/security/vuxml/vuln/2024.xml b/security/vuxml/vuln/2024.xml index 167e83c8ce9a..8e9741134971 100644 --- a/security/vuxml/vuln/2024.xml +++ b/security/vuxml/vuln/2024.xml @@ -1,3 +1,50 @@ + + py-matrix-synapse -- multiple vulnerabilities in versions prior to 1.120.1 + + + py38-matrix-synapse + py39-matrix-synapse + py310-matrix-synapse + py311-matrix-synapse + 1.120.1 + + + + +

element-hq/synapse developers report:

+
+

[The 1.120.1] release fixes multiple security + vulnerabilities, some affecting all prior versions of + Synapse. Server administrators are encouraged to + update Synapse as soon as possible. We are not aware + of these vulnerabilities being exploited in the + wild.

+

Administrators who are unable to update Synapse may + use the workarounds described in the linked GitHub + Security Advisory below.

+
+ +
+ + CVE-2024-52805 + https://github.com/element-hq/synapse/security/advisories/GHSA-rfq8-j7rh-8hf2 + CVE-2024-52815 + https://github.com/element-hq/synapse/security/advisories/GHSA-f3r3-h2mq-hx2h + CVE-2024-53863 + https://github.com/element-hq/synapse/security/advisories/GHSA-vp6v-whfm-rv3g + CVE-2024-53867 + https://github.com/element-hq/synapse/security/advisories/GHSA-56w4-5538-8v8h + CVE-2024-37302 + https://github.com/element-hq/synapse/security/advisories/GHSA-4mhg-xv73-xq2x + CVE-2024-37303 + https://github.com/element-hq/synapse/security/advisories/GHSA-gjgr-7834-rhxr + + + 2024-12-03 + 2024-12-15 + +
+ zeek -- potential DoS vulnerability