USN-7970-1

Source
https://ubuntu.com/security/notices/USN-7970-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7970-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-7970-1
Upstream
Published
2026-01-21T05:29:16.047990Z
Modified
2026-01-21T18:31:02.124203Z
Summary
iperf3 vulnerabilities
Details

Jorge Sancho Larraz discovered that iperf3 did not properly manage certain inputs, which could cause the server process to stop responding, waiting for input on the control connection. A remote attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 22.04 LTS. (CVE-2023-7250)

It was discovered that iperf3 had a timing side-channel when performing RSA decryption. An attacker could possibly use this issue to recover sensitive information. This issue was only addressed in Ubuntu 20.04 LTS and Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-26306)

It was discovered that iperf3 incorrectly handled certain inputs. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-53580)

Han Lee discovered that iperf3 had an off-by-one heap overflow. An attacker could possibly use this issue to crash the program or execute arbitrary code. This issue was only addressed in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2025-54349)

Han Lee discovered that iperf3 did not properly manage certain inputs. An attacker could possibly use this issue to cause a denial of service. (CVE-2025-54350)

References

Affected packages

Ubuntu:Pro:20.04:LTS / iperf3

Package

Name
iperf3
Purl
pkg:deb/ubuntu/iperf3@3.7-3ubuntu0.1~esm2?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.7-3ubuntu0.1~esm2

Affected versions

3.*

3.6-2
3.7-1
3.7-2
3.7-3
3.7-3ubuntu0.1~esm1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "3.7-3ubuntu0.1~esm2",
            "binary_name": "iperf3"
        },
        {
            "binary_version": "3.7-3ubuntu0.1~esm2",
            "binary_name": "libiperf-dev"
        },
        {
            "binary_version": "3.7-3ubuntu0.1~esm2",
            "binary_name": "libiperf0"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7970-1.json"

cves_map

{
    "cves": [],
    "ecosystem": "Ubuntu:Pro:20.04:LTS"
}

Ubuntu:22.04:LTS / iperf3

Package

Name
iperf3
Purl
pkg:deb/ubuntu/iperf3@3.9-1+deb11u1ubuntu0.1?arch=source&distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.9-1+deb11u1ubuntu0.1

Affected versions

3.*

3.9-1
3.9-1build1
3.9-1+deb11u1build0.22.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "3.9-1+deb11u1ubuntu0.1",
            "binary_name": "iperf3"
        },
        {
            "binary_version": "3.9-1+deb11u1ubuntu0.1",
            "binary_name": "libiperf-dev"
        },
        {
            "binary_version": "3.9-1+deb11u1ubuntu0.1",
            "binary_name": "libiperf0"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7970-1.json"

cves_map

{
    "cves": [],
    "ecosystem": "Ubuntu:22.04:LTS"
}

Ubuntu:Pro:24.04:LTS / iperf3

Package

Name
iperf3
Purl
pkg:deb/ubuntu/iperf3@3.16-1ubuntu0.1~esm1?arch=source&distro=esm-apps/noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.16-1ubuntu0.1~esm1

Affected versions

3.*

3.14-1
3.15-1
3.16-1
3.16-1build1
3.16-1build2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
    "binaries": [
        {
            "binary_version": "3.16-1ubuntu0.1~esm1",
            "binary_name": "iperf3"
        },
        {
            "binary_version": "3.16-1ubuntu0.1~esm1",
            "binary_name": "libiperf-dev"
        },
        {
            "binary_version": "3.16-1ubuntu0.1~esm1",
            "binary_name": "libiperf0"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7970-1.json"

cves_map

{
    "cves": [],
    "ecosystem": "Ubuntu:Pro:24.04:LTS"
}

Ubuntu:25.10 / iperf3

Package

Name
iperf3
Purl
pkg:deb/ubuntu/iperf3@3.18-2ubuntu0.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.18-2ubuntu0.1

Affected versions

3.*

3.18-2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "3.18-2ubuntu0.1",
            "binary_name": "iperf3"
        },
        {
            "binary_version": "3.18-2ubuntu0.1",
            "binary_name": "libiperf-dev"
        },
        {
            "binary_version": "3.18-2ubuntu0.1",
            "binary_name": "libiperf0"
        }
    ]
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7970-1.json"

cves_map

{
    "cves": [],
    "ecosystem": "Ubuntu:25.10"
}