Your message dated Fri, 27 Dec 2024 13:08:00 +0000
with message-id <e1tra4o-004dmu...@fasolo.debian.org>
and subject line Bug#1090931: fixed in iperf3 3.18-1
has caused the Debian Bug report #1090931,
regarding iperf3: CVE-2024-53580
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1090931: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1090931
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: iperf3
Version: 3.17.1-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/esnet/iperf/pull/1810
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for iperf3.

CVE-2024-53580[0]:
| iperf v3.17.1 was discovered to contain a segmentation violation via
| the iperf_exchange_parameters() function.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-53580
    https://www.cve.org/CVERecord?id=CVE-2024-53580
[1] https://github.com/esnet/iperf/pull/1810
[2] 
https://github.com/esnet/iperf/commit/3f66f604df7f1038a49108c48612c2f4fe71331f

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: iperf3
Source-Version: 3.18-1
Done: Roberto Lumbreras <ro...@debian.org>

We believe that the bug you reported is fixed in the latest version of
iperf3, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1090...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Roberto Lumbreras <ro...@debian.org> (supplier of updated iperf3 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Fri, 27 Dec 2024 13:20:29 +0100
Source: iperf3
Architecture: source
Version: 3.18-1
Distribution: unstable
Urgency: medium
Maintainer: Roberto Lumbreras <ro...@debian.org>
Changed-By: Roberto Lumbreras <ro...@debian.org>
Closes: 1090733 1090931
Changes:
 iperf3 (3.18-1) unstable; urgency=medium
 .
   * New upstream version. Includes fix for CVE-2024-53580. (Closes: #1090931)
   * Fix "Unit iperf3.service not loaded" warning during installation.
     (Closes: #1090733)
Checksums-Sha1:
 35e7adf56efc59c42816658c1e0fda382119385a 1870 iperf3_3.18-1.dsc
 2684585871c147ff2fd4f683aa079b89396b3078 688037 iperf3_3.18.orig.tar.gz
 9adb787c8bc5fefd9b7e3c40ce57fe0769e69653 13856 iperf3_3.18-1.debian.tar.xz
 992552d3a69b11d23bd5883c92917f9ed1582866 7153 iperf3_3.18-1_amd64.buildinfo
Checksums-Sha256:
 bad9dd1a23dfcf8c3935ffef9b6863a235b473bc37f5804196a5097a9757bc7c 1870 
iperf3_3.18-1.dsc
 c0618175514331e766522500e20c94bfb293b4424eb27d7207fb427b88d20bab 688037 
iperf3_3.18.orig.tar.gz
 51a0b44b38930358bb3cc65709ae91f24855b1de3d06f2070e8c1e91eb8033c3 13856 
iperf3_3.18-1.debian.tar.xz
 f1c15ba6e696fc8786803b046767dbe631c87ba008b7edd53501c1785b552825 7153 
iperf3_3.18-1_amd64.buildinfo
Files:
 bf3c48f505a93cefa8bc2685ef981957 1870 net optional iperf3_3.18-1.dsc
 585d4392667f1a9ae6c2106fbfb64667 688037 net optional iperf3_3.18.orig.tar.gz
 e86da7e5e4b510a2c56e8de31a8be078 13856 net optional iperf3_3.18-1.debian.tar.xz
 b1696d2d8c223630a439e60dac416e77 7153 net optional 
iperf3_3.18-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=GUeH
-----END PGP SIGNATURE-----

Attachment: pgpkDr8TYLpmb.pgp
Description: PGP signature


--- End Message ---

Reply via email to