Lucene search

K
mageiaGentoo FoundationMGASA-2024-0226
HistoryJun 17, 2024 - 8:44 p.m.

Updated iperf packages fix security vulnerability

2024-06-1720:44:07
Gentoo Foundation
advisories.mageia.org
10
iperf3
openssl
security vulnerability
rsa
timing side channel
decryption
attack

AI Score

6.7

Confidence

Low

EPSS

0

Percentile

16.3%

iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in “Everlasting ROBOT: the Marvin Attack” by Hubert Kario.

OSVersionArchitecturePackageVersionFilename
Mageia9noarchiperf< 3.17.1-1iperf-3.17.1-1.mga9