An issue was discovered in Matrix libolm through 3.2.16. Cache-timing attacks can occur due to use of base64 when decoding group session keys. This refers to the libolm implementation of Olm. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
{ "binaries": [ { "binary_version": "3.2.10~dfsg-6ubuntu1", "binary_name": "libjs-olm" }, { "binary_version": "3.2.10~dfsg-6ubuntu1", "binary_name": "libolm-dev" }, { "binary_version": "3.2.10~dfsg-6ubuntu1", "binary_name": "libolm3" }, { "binary_version": "3.2.10~dfsg-6ubuntu1", "binary_name": "python3-olm" } ] }
{ "binaries": [ { "binary_version": "3.2.16+dfsg-2", "binary_name": "libjs-olm" }, { "binary_version": "3.2.16+dfsg-2", "binary_name": "libolm-dev" }, { "binary_version": "3.2.16+dfsg-2", "binary_name": "libolm3" }, { "binary_version": "3.2.16+dfsg-2", "binary_name": "python3-olm" } ] }