{"id":"AZL-40537","summary":"CVE-2024-26306 affecting package iperf3 for versions less than 3.17.1-1","details":"iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in \"Everlasting ROBOT: the Marvin Attack\" by Hubert Kario.","modified":"2026-04-01T05:14:04.324086Z","published":"2024-05-14T15:08:51Z","upstream":["CVE-2024-26306"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-26306"}],"affected":[{"package":{"name":"iperf3","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/iperf3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.17.1-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-40537.json"}}],"schema_version":"1.7.5"}