CVE-2025-61672
Publication date 8 October 2025
Last updated 8 October 2025
Ubuntu priority
Description
Synapse is an open source Matrix homeserver implementation. Lack of validation for device keys in Synapse before 1.138.3 and in Synapse 1.139.0 allow an attacker registered on the victim homeserver to degrade federation functionality, unpredictably breaking outbound federation to other homeservers. The issue is patched in Synapse 1.138.3, 1.138.4, 1.139.1, and 1.139.2. Note that even though 1.138.3 and 1.139.1 fix the vulnerability, they inadvertently introduced an unrelated regression. For this reason, the maintainers of Synapse recommend skipping these releases and upgrading straight to 1.138.4 and 1.139.2.
Status
Package | Ubuntu Release | Status |
---|---|---|
matrix-synapse | 25.10 questing | Not in release |
25.04 plucky | Not in release | |
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
References
Other references
- https://www.cve.org/CVERecord?id=CVE-2025-61672
- https://github.com/element-hq/synapse/commit/26aaaf9e48fff80cf67a20c691c75d670034b3c1
- https://github.com/element-hq/synapse/commit/7069636c2d6d1ef2022287addf3ed8b919ef2740
- https://github.com/element-hq/synapse/pull/17097
- https://github.com/element-hq/synapse/releases/tag/v1.138.3
- https://github.com/element-hq/synapse/releases/tag/v1.139.1
- https://github.com/element-hq/synapse/security/advisories/GHSA-fh66-fcv5-jjfr