Hello Salvatore, On Sun, Jun 12, 2016 at 02:52:11PM +0200, Salvatore Bonaccorso wrote: > Source: iperf3 > Version: 3.0.7-1 > Severity: grave > Tags: security upstream fixed-upstream > > Hi, > > the following vulnerability was published for iperf3. > > CVE-2016-4303[0]: > JSON parsing vulnerability > > If you fix the vulnerability please also make sure to include the > CVE (Common Vulnerabilities & Exposures) id in your changelog entry. > > For further information see: > > [0] https://security-tracker.debian.org/tracker/CVE-2016-4303 > [1] > https://raw.githubusercontent.com/esnet/security/master/cve-2016-4303/esnet-secadv-2016-0001.txt.asc
Thanks for pointing that out! I've packaged the newest iperf3 and uploaded it to mentors: https://mentors.debian.net/package/iperf3 Could you sponsor the upload to unstable? Fixing the vulnerability in stable is not possible for me. Do I need to/Can I contact the security team for support? Thanks, Raoul
smime.p7s
Description: S/MIME cryptographic signature