Fedora 32 update for matrix-synapse, python-authlib, python-canonicaljson, python-signedjson



| Updated: 2025-04-25
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-26890
CWE-ID CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
Fedora
Operating systems & Components / Operating system

python-signedjson
Operating systems & Components / Operating system package or component

python-canonicaljson
Operating systems & Components / Operating system package or component

python-authlib
Operating systems & Components / Operating system package or component

matrix-synapse
Operating systems & Components / Operating system package or component

Vendor Fedoraproject

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Input validation error

EUVDB-ID: #VU48685

Risk: Medium

CVSSv4.0: 4.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2020-26890

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to the application erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the room's state, the impact is long-lasting and is not fixed by an upgrade to a newer version, requiring the event to be manually redacted instead. Since events are replicated to servers of other room members, the impact is not constrained to the server of the event sender.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 32

python-signedjson: before 1.1.1-3.fc32

python-canonicaljson: before 1.4.0-1.fc32

python-authlib: before 0.14.3-1.fc32

matrix-synapse: before 1.23.0-1.fc32

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2020-b90dac7fc4


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###