Lucene search

K
mageiaGentoo FoundationMGASA-2024-0226
HistoryJun 17, 2024 - 8:44 p.m.

Updated iperf packages fix security vulnerability

2024-06-1720:44:07
Gentoo Foundation
advisories.mageia.org
3
iperf3
openssl
security vulnerability
rsa
timing side channel
decryption
attack

6.7 Medium

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in “Everlasting ROBOT: the Marvin Attack” by Hubert Kario.

OSVersionArchitecturePackageVersionFilename
Mageia9noarchiperf< 3.17.1-1iperf-3.17.1-1.mga9

6.7 Medium

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%