An issue was discovered in Matrix libolm through 3.2.16. Cache-timing attacks can occur due to use of base64 when decoding group session keys. This refers to the libolm implementation of Olm. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
{
    "binaries": [
        {
            "binary_version": "3.2.10~dfsg-6ubuntu1",
            "binary_name": "libjs-olm"
        },
        {
            "binary_version": "3.2.10~dfsg-6ubuntu1",
            "binary_name": "libolm-dev"
        },
        {
            "binary_version": "3.2.10~dfsg-6ubuntu1",
            "binary_name": "libolm3"
        },
        {
            "binary_version": "3.2.10~dfsg-6ubuntu1",
            "binary_name": "python3-olm"
        }
    ]
}{
    "binaries": [
        {
            "binary_version": "3.2.16+dfsg-2",
            "binary_name": "libjs-olm"
        },
        {
            "binary_version": "3.2.16+dfsg-2",
            "binary_name": "libolm-dev"
        },
        {
            "binary_version": "3.2.16+dfsg-2",
            "binary_name": "libolm3"
        },
        {
            "binary_version": "3.2.16+dfsg-2",
            "binary_name": "python3-olm"
        }
    ]
}