iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in "Everlasting ROBOT: the Marvin Attack" by Hubert Kario.
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "3.7-3ubuntu0.1~esm2",
"binary_name": "iperf3"
},
{
"binary_version": "3.7-3ubuntu0.1~esm2",
"binary_name": "libiperf-dev"
},
{
"binary_version": "3.7-3ubuntu0.1~esm2",
"binary_name": "libiperf0"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_version": "3.9-1+deb11u1ubuntu0.1",
"binary_name": "iperf3"
},
{
"binary_version": "3.9-1+deb11u1ubuntu0.1",
"binary_name": "libiperf-dev"
},
{
"binary_version": "3.9-1+deb11u1ubuntu0.1",
"binary_name": "libiperf0"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "3.16-1ubuntu0.1~esm1",
"binary_name": "iperf3"
},
{
"binary_version": "3.16-1ubuntu0.1~esm1",
"binary_name": "libiperf-dev"
},
{
"binary_version": "3.16-1ubuntu0.1~esm1",
"binary_name": "libiperf0"
}
]
}