Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2024-45191
HistoryAug 22, 2024 - 4:15 p.m.

CVE-2024-45191

2024-08-2216:15:10
Debian Security Bug Tracker
security-tracker.debian.org
1
matrix libolm
aes implementation
vulnerability
cache-timing attacks
s-boxes
subword step
lookup table

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

AI Score

9.4

Confidence

High

EPSS

0

Percentile

16.4%

An issue was discovered in Matrix libolm through 3.2.16. The AES implementation is vulnerable to cache-timing attacks due to use of S-boxes. This is related to software that uses a lookup table for the SubWord step. This refers to the libolm implementation of Olm. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

OSVersionArchitecturePackageVersionFilename
Debian12allolm<= 3.2.13~dfsg-1olm_3.2.13~dfsg-1_all.deb
Debian11allolm<= 3.2.1~dfsg-7olm_3.2.1~dfsg-7_all.deb
Debian999allolm<= 3.2.16+dfsg-2olm_3.2.16+dfsg-2_all.deb
Debian13allolm<= 3.2.16+dfsg-2olm_3.2.16+dfsg-2_all.deb

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N

AI Score

9.4

Confidence

High

EPSS

0

Percentile

16.4%