An issue was discovered in Matrix libolm through 3.2.16. Cache-timing attacks can occur due to use of base64 when decoding group session keys. This refers to the libolm implementation of Olm. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Configurations
History
17 Jun 2025, 19:55
Type | Values Removed | Values Added |
---|---|---|
First Time |
Matrix olm
Matrix |
|
CPE | cpe:2.3:a:matrix:olm:*:*:*:*:*:*:*:* | |
References | () https://gitlab.matrix.org/matrix-org/olm/ - Product | |
References | () https://gitlab.matrix.org/matrix-org/olm/-/commit/6d4b5b07887821a95b144091c8497d09d377f985 - Patch | |
References | () https://news.ycombinator.com/item?id=41249371 - Issue Tracking | |
References | () https://soatok.blog/2024/08/14/security-issues-in-matrixs-olm-library/ - Exploit |
Information
Published : 2024-08-22 16:15
Updated : 2025-06-17 19:55
NVD link : CVE-2024-45192
Mitre link : CVE-2024-45192
CVE.ORG link : CVE-2024-45192
JSON object : View
Products Affected
matrix
- olm
CWE
CWE-385
Covert Timing Channel