Debian Patches
Status for iperf3/3.18-2+deb13u2
| Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
|---|---|---|---|---|---|---|
| 01-sctp.patch | SCTP workaround for kfreebsd Freebsd has SCTP in the kernel but no sctp library is available, then iperf3 fails to compile because the lack of the library. . This patch moves the search for the library before kernel headers checks and of course it should be removed once Freebsd gets the library. =================================================================== |
Roberto Lumbreras <rover@debian.org> | no | |||
| 02-gcc15.patch | Fix build with gcc-15 This patches fixes de ftbfs with GCC-15 commit beadb59b90e8d3339d31f9f15525108072fde135 diff --git a/src/iperf_api.c b/src/iperf_api.c index bad0a63..901aec3 100644 |
Rudi Heitbaum <rudi@heitbaum.com> | invalid | |||
| CVE-2025-54349.patch | [PATCH] Fix off-by-one heap overflow in auth. Reported by Han Lee (Apple Information Security) CVE-2025-54349 |
Sarah Larsen <swlarsen@es.net> | no | 2025-06-25 | ||
| CVE-2025-54350.patch | [PATCH] Prevent crash due to assertion failures on malformed authentication attempt. Reported by Han Lee (Apple Information Security) CVE-2025-54350 |
"Bruce A. Mah" <bmah@es.net> | no | 2025-06-24 | ||
| 03-openssl.patch | Resolve issue with openssl 3.5.3 encrypt #1956 Set output buffer size prior to encrypt operation When calling EVP_PKEY_encrypt with a non-null output buffer, the output buffer length must be provided. Attempts to write beyond this length will fail. =================================================================== |
Michael Lowman (GitHub) | invalid |
All known versions for source package 'iperf3'
- 3.20-2 (sid, forky)
- 3.18-2+deb13u2 (trixie-proposed-updates)
- 3.18-2+deb13u1 (trixie)
- 3.12-1+deb12u2 (bookworm)
- 3.12-1+deb12u1 (bookworm-security)
