CVE-2022-41904 – Element iOS is vulnerable due to missing decoration for events decrypted with untrusted Megolm sessions
https://notcve.org/view.php?id=CVE-2022-41904
Element iOS is an iOS Matrix client provided by Element. It is based on MatrixSDK. Prior to version 1.9.7, events encrypted using Megolm for which trust could not be established did not get decorated accordingly (with warning shields). Therefore a malicious homeserver could inject messages into the room without the user being alerted that the messages were not sent by a verified group member, even if the user has previously verified all group members. This issue has been patched in Element iOS 1.9.7. • https://github.com/vector-im/element-ios/releases/tag/v1.9.7 https://github.com/vector-im/element-ios/security/advisories/GHSA-fm8m-99j7-323g • CWE-357: Insufficient UI Warning of Dangerous Operations •
CVE-2021-44538
https://notcve.org/view.php?id=CVE-2021-44538
The olm_session_describe function in Matrix libolm before 3.2.7 is vulnerable to a buffer overflow. The Olm session object represents a cryptographic channel between two parties. Therefore, its state is partially controllable by the remote party of the channel. Attackers can construct a crafted sequence of messages to manipulate the state of the receiver's session in such a way that, for some buffer sizes, a buffer overflow happens on a call to olm_session_describe. Furthermore, safe buffer sizes were undocumented. • https://gitlab.matrix.org/matrix-org/olm/-/tags https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html https://matrix.org/blog/2021/12/13/disclosure-buffer-overflow-in-libolm-and-matrix-js-sdk https://www.debian.org/security/2022/dsa-5034 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2021-40824
https://notcve.org/view.php?id=CVE-2021-40824
A logic error in the room key sharing functionality of Element Android before 1.2.2 and matrix-android-sdk2 (aka Matrix SDK for Android) before 1.2.2 allows a malicious Matrix homeserver present in an encrypted room to steal room encryption keys (via crafted Matrix protocol messages) that were originally sent by affected Matrix clients participating in that room. This allows the attacker to decrypt end-to-end encrypted messages sent by affected clients. Un error lógico en la funcionalidad de compartición de claves de sala de Element Android antes de la versión 1.2.2 y matrix-android-sdk2 (también conocido como Matrix SDK para Android) antes de la versión 1.2.2 permite a un servidor doméstico de Matrix malicioso presente en una sala cifrada robar las claves de cifrado de la sala (a través de mensajes de protocolo de Matrix falsificados) que fueron enviados originalmente por los clientes de Matrix afectados que participan en esa sala. Esto permite al atacante descifrar los mensajes cifrados de extremo a extremo enviados por los clientes afectados • https://github.com/matrix-org/matrix-android-sdk2/releases/tag/v1.2.2 https://matrix.org/blog/2021/09/13/vulnerability-disclosure-key-sharing • CWE-290: Authentication Bypass by Spoofing •