MGASA-2021-0571

Source
https://advisories.mageia.org/MGASA-2021-0571.html
Import Source
https://advisories.mageia.org/MGASA-2021-0571.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0571
Related
Published
2021-12-19T16:13:42Z
Modified
2021-12-19T15:39:26Z
Summary
Updated olm packages fix security vulnerability
Details

Updated olm packages fix security vulnerability:

The olmsessiondescribe function in Matrix libolm before 3.2.7 is vulnerable to a buffer overflow. The Olm session object represents a cryptographic channel between two parties. Therefore, its state is partially controllable by the remote party of the channel. Attackers can construct a crafted sequence of messages to manipulate the state of the receiver's session in such a way that, for some buffer sizes, a buffer overflow happens on a call to olmsessiondescribe. Furthermore, safe buffer sizes were undocumented. The overflow content is partially controllable by the attacker and limited to ASCII spaces and digits (CVE-2021-44538).

References
Credits

Affected packages

Mageia:8 / olm

Package

Name
olm
Purl
pkg:rpm/mageia/olm?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.1-1.1.mga8

Ecosystem specific

{
    "section": "core"
}