Описание
matrix-sdk-base denial of service via custom m.room.join_rules event values
The matrix-sdk-base crate is unable to handle responses that include custom m.room.join_rules values due to a serialization bug.
This can be exploited to cause a denial-of-service condition, if a user is invited to a room with non-standard join rules, the crate's sync process will stall, preventing further processing for all rooms.
Patches
The issue is fixed in matrix-sdk-base 0.16.0.
Workarounds
Users can leave affected rooms on another client to mitigate the issue.
References
The issue was fixed in https://github.com/matrix-org/matrix-rust-sdk/pull/5924.
Ссылки
- https://github.com/matrix-org/matrix-rust-sdk/security/advisories/GHSA-jj6p-3m75-g2p3
- https://nvd.nist.gov/vuln/detail/CVE-2025-66622
- https://github.com/matrix-org/matrix-rust-sdk/pull/5924
- https://github.com/matrix-org/matrix-rust-sdk/commit/4ea0418abefab2aa93f8851a4d39c723e703e6b0
- https://rustsec.org/advisories/RUSTSEC-2025-0135.html
Пакеты
matrix-sdk-base
< 0.16.0
0.16.0
Связанные уязвимости
matrix-sdk-base is the base component to build a Matrix client library. Versions 0.14.1 and prior are unable to handle responses that include custom m.room.join_rules values due to a serialization bug. This can be exploited to cause a denial-of-service condition, if a user is invited to a room with non-standard join rules, the crate's sync process will stall, preventing further processing for all rooms. This is fixed in version 0.16.0.