CVE-2021-44538

Summary

CVECVE-2021-44538
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2021-12-14 14:15:00 UTC
Updated2023-08-08 14:22:00 UTC
DescriptionThe olm_session_describe function in Matrix libolm before 3.2.7 is vulnerable to a buffer overflow. The Olm session object represents a cryptographic channel between two parties. Therefore, its state is partially controllable by the remote party of the channel. Attackers can construct a crafted sequence of messages to manipulate the state of the receiver's session in such a way that, for some buffer sizes, a buffer overflow happens on a call to olm_session_describe. Furthermore, safe buffer sizes were undocumented. The overflow content is partially controllable by the attacker and limited to ASCII spaces and digits. The known affected products are Element Web And SchildiChat Web.

Risk And Classification

Problem Types: CWE-119

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Cinny Project Cinny All All All All
Operating System Debian Debian Linux 10.0 All All All
Operating System Debian Debian Linux 11.0 All All All
Operating System Debian Debian Linux 9.0 All All All
Application Matrix Element All All All All
Application Matrix Element All All All All
Application Matrix Javascript Sdk All All All All
Application Matrix Olm All All All All
Application Schildi Schildichat All All All All
Application Schildi Schildichat All All All All

References

ReferenceSourceLinkTags
Disclosure: buffer overflow in libolm and matrix-js-sdk | Matrix.org MISC matrix.org
Tags · matrix-org / Olm · GitLab MISC gitlab.matrix.org
Debian -- Security Information -- DSA-5034-1 thunderbird DEBIAN www.debian.org
[SECURITY] [DLA 2874-1] thunderbird security update MLIST lists.debian.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 178983 Debian Security Update for thunderbird (DSA 5034-1)
  • 178986 Debian Security Update for thunderbird (DLA 2874-1)
  • 183992 Debian Security Update for olmthunderbird (CVE-2021-44538)
  • 198641 Ubuntu Security Notification for Thunderbird Vulnerabilities (USN-5248-1)
  • 198643 Ubuntu Security Notification for Thunderbird Vulnerabilities (USN-5246-1)
  • 376199 Mozilla Thunderbird Multiple Vulnerabilities (MFSA2021-55)
  • 501919 Alpine Linux Security Update for riot-web
  • 502383 Alpine Linux Security Update for thunderbird
  • 503179 Alpine Linux Security Update for element-web
  • 505375 Alpine Linux Security Update for riot-web
  • 505450 Alpine Linux Security Update for thunderbird
  • 506039 Alpine Linux Security Update for element-web
  • 751599 OpenSUSE Security Update for MozillaThunderbird (openSUSE-SU-2022:0058-1)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report