An issue was discovered in Matrix libolm through 3.2.16. The AES implementation is vulnerable to cache-timing attacks due to use of S-boxes. This is related to software that uses a lookup table for the SubWord step. This refers to the libolm implementation of Olm. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
{
"binaries": [
{
"binary_name": "libjs-olm",
"binary_version": "3.2.10~dfsg-6ubuntu1"
},
{
"binary_name": "libolm-dev",
"binary_version": "3.2.10~dfsg-6ubuntu1"
},
{
"binary_name": "libolm3",
"binary_version": "3.2.10~dfsg-6ubuntu1"
},
{
"binary_name": "python3-olm",
"binary_version": "3.2.10~dfsg-6ubuntu1"
}
]
}
{
"binaries": [
{
"binary_name": "libjs-olm",
"binary_version": "3.2.16+dfsg-2"
},
{
"binary_name": "libolm-dev",
"binary_version": "3.2.16+dfsg-2"
},
{
"binary_name": "libolm3",
"binary_version": "3.2.16+dfsg-2"
},
{
"binary_name": "python3-olm",
"binary_version": "3.2.16+dfsg-2"
}
]
}