Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. MMR makes requests to other servers as part of normal operation, and these resource owners can return large amounts of JSON back to MMR for parsing. In parsing, MMR can consume large amounts of memory and exhaust available memory. This is fixed in MMR v1.3.8. Users are advised to upgrade. For users unable to upgrade; forward proxies can be configured to block requests to unsafe hosts. Alternatively, MMR processes can be configured with memory limits and auto-restart. Running multiple MMR processes concurrently can help ensure a restart does not overly impact users.
Metrics
Affected Vendors & Products
References
History
Wed, 20 Aug 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
T2bot
T2bot matrix-media-repo |
|
CPEs | cpe:2.3:a:t2bot:matrix-media-repo:*:*:*:*:*:*:*:* | |
Vendors & Products |
T2bot
T2bot matrix-media-repo |
Wed, 12 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 16 Jan 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Matrix Media Repo (MMR) is a highly configurable multi-homeserver media repository for Matrix. MMR makes requests to other servers as part of normal operation, and these resource owners can return large amounts of JSON back to MMR for parsing. In parsing, MMR can consume large amounts of memory and exhaust available memory. This is fixed in MMR v1.3.8. Users are advised to upgrade. For users unable to upgrade; forward proxies can be configured to block requests to unsafe hosts. Alternatively, MMR processes can be configured with memory limits and auto-restart. Running multiple MMR processes concurrently can help ensure a restart does not overly impact users. | |
Title | Denial of service through memory exhaustion in Matrix Media Repo | |
Weaknesses | CWE-789 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-01-16T19:12:25.853Z
Updated: 2025-02-12T20:31:21.849Z
Reserved: 2024-11-15T17:11:13.438Z
Link: CVE-2024-52791

Updated: 2025-02-12T20:26:23.221Z

Status : Analyzed
Published: 2025-01-16T20:15:32.667
Modified: 2025-08-20T14:49:35.020
Link: CVE-2024-52791

No data.