Hello Salvatore,

On Sun, Jun 12, 2016 at 02:52:11PM +0200, Salvatore Bonaccorso wrote:
> Source: iperf3
> Version: 3.0.7-1
> Severity: grave
> Tags: security upstream fixed-upstream
> 
> Hi,
> 
> the following vulnerability was published for iperf3.
> 
> CVE-2016-4303[0]:
> JSON parsing vulnerability
> 
> If you fix the vulnerability please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2016-4303
> [1] 
> https://raw.githubusercontent.com/esnet/security/master/cve-2016-4303/esnet-secadv-2016-0001.txt.asc

Thanks for pointing that out! I've packaged the newest iperf3 and
uploaded it to mentors:

https://mentors.debian.net/package/iperf3

Could you sponsor the upload to unstable?

Fixing the vulnerability in stable is not possible for me.
Do I need to/Can I contact the security team for support?

 Thanks,

  Raoul

Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to