By the Year
In 2022 there have been 0 vulnerabilities in Matrix Olm . Last year Olm had 2 security vulnerabilities published. Right now, Olm is on track to have less security vulnerabilities in 2022 than it did last year.
It may take a day or so for new Olm vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Matrix Olm Security Vulnerabilities
The olm_session_describe function in Matrix libolm before 3.2.7 is vulnerable to a buffer overflow
9.8 - Critical
- December 14, 2021
The olm_session_describe function in Matrix libolm before 3.2.7 is vulnerable to a buffer overflow. The Olm session object represents a cryptographic channel between two parties. Therefore, its state is partially controllable by the remote party of the channel. Attackers can construct a crafted sequence of messages to manipulate the state of the receiver's session in such a way that, for some buffer sizes, a buffer overflow happens on a call to olm_session_describe. Furthermore, safe buffer sizes were undocumented. The overflow content is partially controllable by the attacker and limited to ASCII spaces and digits. The known affected products are Element Web And SchildiChat Web.
Classic Buffer Overflow
Matrix libolm before 3.2.3
9.8 - Critical
- June 16, 2021
Matrix libolm before 3.2.3 allows a malicious Matrix homeserver to crash a client (while it is attempting to retrieve an Olm encrypted room key backup from the homeserver) because olm_pk_decrypt has a stack-based buffer overflow. Remote code execution might be possible for some nonstandard build configurations.