An issue was discovered in Matrix libolm through 3.2.16. Cache-timing attacks can occur due to use of base64 when decoding group session keys. This refers to the libolm implementation of Olm. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
{ "binaries": [ { "binary_name": "libjs-olm", "binary_version": "3.2.10~dfsg-6ubuntu1" }, { "binary_name": "libolm-dev", "binary_version": "3.2.10~dfsg-6ubuntu1" }, { "binary_name": "libolm3", "binary_version": "3.2.10~dfsg-6ubuntu1" }, { "binary_name": "python3-olm", "binary_version": "3.2.10~dfsg-6ubuntu1" } ] }
{ "binaries": [ { "binary_name": "libjs-olm", "binary_version": "3.2.16+dfsg-2" }, { "binary_name": "libolm-dev", "binary_version": "3.2.16+dfsg-2" }, { "binary_name": "libolm3", "binary_version": "3.2.16+dfsg-2" }, { "binary_name": "python3-olm", "binary_version": "3.2.16+dfsg-2" } ] }