Fedora Linux 8812 Published by

A libolm security update has been released for Fedora 35.



SECURITY: Fedora 35 Update: libolm-3.2.8-1.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-16b848fe79
2021-12-16 01:16:25.569408
--------------------------------------------------------------------------------

Name : libolm
Product : Fedora 35
Version : 3.2.8
Release : 1.fc35
URL :   https://gitlab.matrix.org/matrix-org/olm
Summary : Double Ratchet cryptographic library
Description :
An implementation of the Double Ratchet cryptographic ratchet in C++.

--------------------------------------------------------------------------------
Update Information:

Fixes CVE in libolm as described here:
  https://matrix.org/blog/2021/12/13/disclosure-buffer-overflow-in-libolm-and-
matrix-js-sdk ---- Updated to version 3.2.7.
--------------------------------------------------------------------------------
ChangeLog:

* Mon Dec 13 2021 Vitaly Zaitsev - 3.2.8-1
- Updated to version 3.2.8 with CVE fixes.
* Tue Dec 7 2021 Vitaly Zaitsev - 3.2.7-1
- Updated to version 3.2.7.
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2029626 - libolm-3.2.7 is available
  https://bugzilla.redhat.com/show_bug.cgi?id=2029626
[ 2 ] Bug #2031867 - libolm-3.2.8 is available
  https://bugzilla.redhat.com/show_bug.cgi?id=2031867
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-16b848fe79' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________