UBUNTU-CVE-2025-54351

Source
https://ubuntu.com/security/CVE-2025-54351
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-54351.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2025-54351
Upstream
Published
2025-08-03T02:15:00Z
Modified
2026-01-27T12:48:09.323536Z
Severity
  • 8.9 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L CVSS Calculator
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

In iperf before 3.19.1, net.c has a buffer overflow when --skip-rx-copy is used (for MSG_TRUNC in recv).

References

Affected packages

Ubuntu:25.10
iperf3

Package

Name
iperf3
Purl
pkg:deb/ubuntu/iperf3@3.18-2ubuntu0.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.18-2
3.18-2ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "iperf3",
            "binary_version": "3.18-2ubuntu0.1"
        },
        {
            "binary_name": "libiperf-dev",
            "binary_version": "3.18-2ubuntu0.1"
        },
        {
            "binary_name": "libiperf0",
            "binary_version": "3.18-2ubuntu0.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-54351.json"
Ubuntu:Pro:16.04:LTS
iperf3

Package

Name
iperf3
Purl
pkg:deb/ubuntu/iperf3@3.0.11-1ubuntu0.1~esm2?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.0.11-1
3.0.11-1ubuntu0.1~esm1
3.0.11-1ubuntu0.1~esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "iperf3",
            "binary_version": "3.0.11-1ubuntu0.1~esm2"
        },
        {
            "binary_name": "libiperf-dev",
            "binary_version": "3.0.11-1ubuntu0.1~esm2"
        },
        {
            "binary_name": "libiperf0",
            "binary_version": "3.0.11-1ubuntu0.1~esm2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-54351.json"
Ubuntu:Pro:18.04:LTS
iperf3

Package

Name
iperf3
Purl
pkg:deb/ubuntu/iperf3@3.1.3-1ubuntu0.1~esm1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.1.3-1
3.1.3-1ubuntu0.1~esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "iperf3",
            "binary_version": "3.1.3-1ubuntu0.1~esm1"
        },
        {
            "binary_name": "libiperf-dev",
            "binary_version": "3.1.3-1ubuntu0.1~esm1"
        },
        {
            "binary_name": "libiperf0",
            "binary_version": "3.1.3-1ubuntu0.1~esm1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-54351.json"
Ubuntu:Pro:20.04:LTS
iperf3

Package

Name
iperf3
Purl
pkg:deb/ubuntu/iperf3@3.7-3ubuntu0.1~esm2?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.6-2
3.7-1
3.7-2
3.7-3
3.7-3ubuntu0.1~esm1
3.7-3ubuntu0.1~esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "iperf3",
            "binary_version": "3.7-3ubuntu0.1~esm2"
        },
        {
            "binary_name": "libiperf-dev",
            "binary_version": "3.7-3ubuntu0.1~esm2"
        },
        {
            "binary_name": "libiperf0",
            "binary_version": "3.7-3ubuntu0.1~esm2"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-54351.json"
Ubuntu:Pro:22.04:LTS
iperf3

Package

Name
iperf3
Purl
pkg:deb/ubuntu/iperf3@3.9-1+deb11u1ubuntu0.1?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.9-1
3.9-1build1
3.9-1+deb11u1build0.22.04.1
3.9-1+deb11u1ubuntu0.1~esm1
3.9-1+deb11u1ubuntu0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "iperf3",
            "binary_version": "3.9-1+deb11u1ubuntu0.1"
        },
        {
            "binary_name": "libiperf-dev",
            "binary_version": "3.9-1+deb11u1ubuntu0.1"
        },
        {
            "binary_name": "libiperf0",
            "binary_version": "3.9-1+deb11u1ubuntu0.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-54351.json"
Ubuntu:Pro:24.04:LTS
iperf3

Package

Name
iperf3
Purl
pkg:deb/ubuntu/iperf3@3.16-1ubuntu0.1~esm1?arch=source&distro=esm-apps/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.14-1
3.15-1
3.16-1
3.16-1build1
3.16-1build2
3.16-1ubuntu0.1~esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "iperf3",
            "binary_version": "3.16-1ubuntu0.1~esm1"
        },
        {
            "binary_name": "libiperf-dev",
            "binary_version": "3.16-1ubuntu0.1~esm1"
        },
        {
            "binary_name": "libiperf0",
            "binary_version": "3.16-1ubuntu0.1~esm1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-54351.json"