Bug 1224262 (CVE-2024-26306) - VUL-0: CVE-2024-26306: iperf: vulnerable to marvin attack if the authentication option is used
Summary: VUL-0: CVE-2024-26306: iperf: vulnerable to marvin attack if the authenticati...
Status: NEW
Alias: CVE-2024-26306
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/405059/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-26306:5.9:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-05-15 08:47 UTC by SMASH SMASH
Modified: 2024-07-11 09:20 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-05-15 08:47:33 UTC
iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-26306
https://www.cve.org/CVERecord?id=CVE-2024-26306
https://downloads.es.net/pub/iperf/esnet-secadv-2024-0001.txt.asc
https://github.com/esnet/iperf/releases/tag/3.17
https://bugzilla.redhat.com/show_bug.cgi?id=2270270
Comment 3 Camila Camargo de Matos 2024-05-15 08:53:45 UTC
The fixing commit seems to be available at: https://github.com/esnet/iperf/commit/de9c34bbc53de7bbbdf44b06a391c4ad6714cb25

Do note, however, that the upstream release note [0] says that this is a breaking change.

[0] https://github.com/esnet/iperf/releases/tag/3.17
Comment 5 OBSbugzilla Bot 2024-05-15 11:35:01 UTC
This is an autogenerated message for OBS integration:
This bug (1224262) was mentioned in
https://build.opensuse.org/request/show/1174204 Factory / iperf
Comment 7 Maintenance Automation 2024-06-11 12:31:06 UTC
SUSE-SU-2024:1981-1: An update that solves one vulnerability can now be installed.

Category: security (moderate)
Bug References: 1224262
CVE References: CVE-2024-26306
Maintenance Incident: [SUSE:Maintenance:34198](https://smelt.suse.de/incident/34198/)
Sources used:
openSUSE Leap 15.5 (src):
 iperf-3.17.1-150000.3.9.1
openSUSE Leap 15.6 (src):
 iperf-3.17.1-150000.3.9.1
SUSE Package Hub 15 15-SP5 (src):
 iperf-3.17.1-150000.3.9.1
SUSE Package Hub 15 15-SP6 (src):
 iperf-3.17.1-150000.3.9.1
SUSE Enterprise Storage 7.1 (src):
 iperf-3.17.1-150000.3.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Dirk Mueller 2024-07-11 09:20:08 UTC
all updates have been submitted