GHSA-gp86-q8hg-fpxj

Suggest an improvement
Source
https://github.com/advisories/GHSA-gp86-q8hg-fpxj
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/01/GHSA-gp86-q8hg-fpxj/GHSA-gp86-q8hg-fpxj.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-gp86-q8hg-fpxj
Aliases
Published
2025-01-16T19:07:43Z
Modified
2025-01-17T15:42:50Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
matrix-media-repo (MMR) allows a denial of service through memory exhaustion
Details

Impact

MMR makes requests to other servers as part of normal operation, and these resource owners can return large amounts of JSON back to MMR for parsing. In parsing, MMR can consume large amounts of memory and exhaust available memory.

Patches

This is fixed in MMR v1.3.8.

Workarounds

Forward proxies can be configured to block requests to unsafe hosts. Alternatively, MMR processes can be configured with memory limits and auto-restart. Running multiple MMR processes concurrently can help ensure a restart does not overly impact users.

Database specific
{
    "nvd_published_at": "2025-01-16T20:15:32Z",
    "cwe_ids": [
        "CWE-789"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2025-01-16T19:07:43Z"
}
References

Affected packages

Go / github.com/t2bot/matrix-media-repo

Package

Name
github.com/t2bot/matrix-media-repo
View open source insights on deps.dev
Purl
pkg:golang/github.com/t2bot/matrix-media-repo

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.8

Database specific

{
    "last_known_affected_version_range": "<= 1.3.7"
}