An issue was discovered in Matrix libolm through 3.2.16. Cache-timing attacks can occur due to use of base64 when decoding group session keys. This refers to the libolm implementation of Olm. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
{
"binaries": [
{
"binary_name": "libjs-olm",
"binary_version": "3.2.10~dfsg-6ubuntu1"
},
{
"binary_name": "libolm-dev",
"binary_version": "3.2.10~dfsg-6ubuntu1"
},
{
"binary_name": "libolm3",
"binary_version": "3.2.10~dfsg-6ubuntu1"
},
{
"binary_name": "python3-olm",
"binary_version": "3.2.10~dfsg-6ubuntu1"
}
]
}{
"binaries": [
{
"binary_name": "libjs-olm",
"binary_version": "3.2.16+dfsg-2"
},
{
"binary_name": "libolm-dev",
"binary_version": "3.2.16+dfsg-2"
},
{
"binary_name": "libolm3",
"binary_version": "3.2.16+dfsg-2"
},
{
"binary_name": "python3-olm",
"binary_version": "3.2.16+dfsg-2"
}
]
}