Safety vulnerability ID: 42308
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Sydent 2.3.0 includes a fix for CVE-2021-29430: Sydent does not limit the size of requests it receives from HTTP clients. A malicious user could send an HTTP request with a very large body, leading to memory exhaustion and denial of service. Sydent also does not limit response size for requests it makes to remote Matrix homeservers. A malicious homeserver could return a very large response, again leading to memory exhaustion and denial of service. This affects any server which accepts registration requests from untrusted clients. As a workaround, request sizes can be limited in an HTTP reverse-proxy. There are no known workarounds for the problem with overlarge responses.
Latest version: 2.6.1
Reference Matrix Identity Verification and Lookup Server
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application