First published: Thu Aug 22 2024(Updated: )
An issue was discovered in Matrix libolm through 3.2.16. The AES implementation is vulnerable to cache-timing attacks due to use of S-boxes. This is related to software that uses a lookup table for the SubWord step. This refers to the libolm implementation of Olm. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Matrix olm | <=3.2.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45191 has a high severity due to its vulnerability to cache-timing attacks in the AES implementation.
To fix CVE-2024-45191, update Matrix libolm to version 3.2.17 or later.
CVE-2024-45191 can allow attackers to exploit timing discrepancies to gain sensitive information from the AES implementation.
CVE-2024-45191 affects Matrix libolm versions up to and including 3.2.16.
Users of Matrix libolm versions 3.2.16 and earlier are impacted by CVE-2024-45191.