CVE-2024-31208
Publication date 23 April 2024
Last updated 23 April 2025
Ubuntu priority
Synapse is an open-source Matrix homeserver. A remote Matrix user with malicious intent, sharing a room with Synapse instances before 1.105.1, can dispatch specially crafted events to exploit a weakness in the V2 state resolution algorithm. This can induce high CPU consumption and accumulate excessive data in the database of such instances, resulting in a denial of service. Servers in private federations, or those that do not federate, are not affected. Server administrators should upgrade to 1.105.1 or later. Some workarounds are available. One can ban the malicious users or ACL block servers from the rooms and/or leave the room and purge the room using the admin API.
Status
Package | Ubuntu Release | Status |
---|---|---|
matrix-synapse | 24.10 oracular | Ignored fix infeasible |
24.04 LTS noble | Ignored fix infeasible | |
22.04 LTS jammy |
Fixed 1.53.0-1ubuntu0.1~esm2
|
|
20.04 LTS focal | Ignored patch infeasible | |
18.04 LTS bionic | Ignored patch infeasible | |
synapse | 25.04 plucky |
Needs evaluation
|
24.10 oracular |
Needs evaluation
|
|
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
john-breton
matrix-synapse versions < 1.53.0-1 have major changes that prevent a patch from being feasibly applied for for this CVE. Noble and oracular are FTBFS for matrix-synapse and will be ignored due to the infeasibility of providing fixes for the releases.
References
Related Ubuntu Security Notices (USN)
- USN-7444-1
- Synapse vulnerabilities
- 22 April 2025