UBUNTU-CVE-2021-34813

Source
https://ubuntu.com/security/CVE-2021-34813
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-34813.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-34813
Upstream
Downstream
Related
Published
2021-06-16T18:15:00Z
Modified
2026-02-04T02:12:58.558178Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Matrix libolm before 3.2.3 allows a malicious Matrix homeserver to crash a client (while it is attempting to retrieve an Olm encrypted room key backup from the homeserver) because olmpkdecrypt has a stack-based buffer overflow. Remote code execution might be possible for some nonstandard build configurations.

References

Affected packages

Ubuntu:Pro:20.04:LTS / olm

Package

Name
olm
Purl
pkg:deb/ubuntu/olm@3.1.3+dfsg-2ubuntu0.1~esm1?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.3+dfsg-2ubuntu0.1~esm1

Affected versions

3.*
3.1.3+dfsg-2
3.1.3+dfsg-2build1
3.1.3+dfsg-2build2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libolm-dev",
            "binary_version": "3.1.3+dfsg-2ubuntu0.1~esm1"
        },
        {
            "binary_name": "libolm3",
            "binary_version": "3.1.3+dfsg-2ubuntu0.1~esm1"
        },
        {
            "binary_name": "python3-olm",
            "binary_version": "3.1.3+dfsg-2ubuntu0.1~esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-34813.json"