CVE-2023-7250

NameCVE-2023-7250
DescriptionA flaw was found in iperf, a utility for testing network performance using TCP, UDP, and SCTP. A malicious or malfunctioning client can send less than the expected amount of data to the iperf server, which can cause the server to hang indefinitely waiting for the remainder or until the connection gets closed. This will prevent other connections to the server, leading to a denial of service.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
iperf3 (PTS)jessie, jessie (lts)3.0.7-1+deb8u2vulnerable
stretch (lts), stretch3.1.3-1+deb9u1vulnerable
buster (security), buster, buster (lts)3.6-2+deb10u1vulnerable
bullseye (security), bullseye3.9-1+deb11u1vulnerable
bookworm (security), bookworm3.12-1+deb12u1vulnerable
sid, trixie3.17.1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
iperf3source(unstable)3.15-1

Notes

[bookworm] - iperf3 <ignored> (Minor issue)
[bullseye] - iperf3 <no-dsa> (Minor issue)
[buster] - iperf3 <no-dsa> (Minor issue)
https://downloads.es.net/pub/iperf/esnet-secadv-2023-0002.txt.asc
https://github.com/esnet/iperf/commit/5e3704dd850a5df2fb2b3eafd117963d017d07b4 (3.15)
[stretch] - iperf3 <postponed> (Minor issue)
[jessie] - iperf3 <postponed> (Minor issue)

Search for package or bug name: Reporting problems