CVE-2021-44538 log

Source
Severity Medium
Remote Yes
Type Arbitrary code execution
Description
The olm_session_describe function in Matrix libolm before version 3.2.8 is vulnerable to a buffer overflow. The Olm session object represents a cryptographic channel between two parties. Therefore, its state is partially controllable by the remote party of the channel. Attackers can construct a crafted sequence of messages to manipulate the state of the receiver's session in such a way that, for some buffer sizes, a buffer overflow happens on a call to olm_session_describe. Furthermore, safe buffer sizes were undocumented. The overflow content is partially controllable by the attacker and limited to ASCII spaces and digits.
Group Package Affected Fixed Severity Status Ticket
AVG-2639 element-web 1.9.6-1 1.9.7-1 Medium Fixed
AVG-2638 libolm 3.2.7-2 3.2.8-1 Medium Fixed
References
https://matrix.org/blog/2021/12/13/disclosure-buffer-overflow-in-libolm-and-matrix-js-sdk/
https://gitlab.matrix.org/matrix-org/olm/-/commit/c23ce70fc66c26db5839ddb5a3b46d4c3d3abed6