UBUNTU-CVE-2021-34813

Source
https://ubuntu.com/security/CVE-2021-34813
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-34813.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2021-34813
Related
Published
2021-06-16T18:15:00Z
Modified
2025-06-03T17:35:46Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Matrix libolm before 3.2.3 allows a malicious Matrix homeserver to crash a client (while it is attempting to retrieve an Olm encrypted room key backup from the homeserver) because olmpkdecrypt has a stack-based buffer overflow. Remote code execution might be possible for some nonstandard build configurations.

References

Affected packages

Ubuntu:Pro:20.04:LTS / olm

Package

Name
olm
Purl
pkg:deb/ubuntu/olm@3.1.3+dfsg-2ubuntu0.1~esm1?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.3+dfsg-2ubuntu0.1~esm1

Affected versions

3.*

3.1.3+dfsg-2
3.1.3+dfsg-2build1
3.1.3+dfsg-2build2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "3.1.3+dfsg-2ubuntu0.1~esm1",
            "binary_name": "libolm-dev"
        },
        {
            "binary_version": "3.1.3+dfsg-2ubuntu0.1~esm1",
            "binary_name": "libolm3"
        },
        {
            "binary_version": "3.1.3+dfsg-2ubuntu0.1~esm1",
            "binary_name": "libolm3-dbgsym"
        },
        {
            "binary_version": "3.1.3+dfsg-2ubuntu0.1~esm1",
            "binary_name": "python3-olm"
        },
        {
            "binary_version": "3.1.3+dfsg-2ubuntu0.1~esm1",
            "binary_name": "python3-olm-dbgsym"
        }
    ],
    "ubuntu_priority": "medium"
}