Source: iperf3
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for iperf3.

CVE-2024-26306[0]:
| iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server
| with RSA authentication, allows a timing side channel in RSA
| decryption operations. This side channel could be sufficient for an
| attacker to recover credential plaintext. It requires the attacker
| to send a large number of messages for decryption, as described in
| "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

https://downloads.es.net/pub/iperf/esnet-secadv-2024-0001.txt.asc
https://github.com/esnet/iperf/releases/tag/3.17


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-26306
    https://www.cve.org/CVERecord?id=CVE-2024-26306

Please adjust the affected versions in the BTS as needed.

Reply via email to