Name | CVE-2024-26306 |
Description | iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-4032-1 |
Debian Bugs | 1071751 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
iperf3 (PTS) | bullseye | 3.9-1+deb11u1 | vulnerable |
bullseye (security) | 3.9-1+deb11u2 | fixed | |
bookworm, bookworm (security) | 3.12-1+deb12u1 | vulnerable | |
trixie | 3.18-1 | fixed | |
sid | 3.18-2 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
iperf3 | source | bullseye | 3.9-1+deb11u2 | DLA-4032-1 | ||
iperf3 | source | (unstable) | 3.17.1-1 | 1071751 |
[bookworm] - iperf3 <ignored> (Minor issue)
[buster] - iperf3 <postponed> (Minor issue; can be fixed in next update)
Fixed by: https://github.com/esnet/iperf/commit/299b356df6939f71619bf45bf7a7d2222e17d840 (3.17)