2c572e125fAccepting request 1240619 from network:utilities
factory
Ana Guerrero
2025-01-27 20:33:49 +00:00
97c5381fc0- update to 3.18 (bsc#1234705, CVE-2024-53580): * SECURITY NOTE: Thanks to Leonid Krolle Bi.Zone for discovering a JSON type security vulnerability that caused a segmentation fault in the server. (CVE-2024-53580) This has now been fixed. (PR#1810) * UDP packets per second now reports the correct number of packets, by reporting NET_SOFTERROR if there's a EAGAIN/EINTR errno if no data was sent (#1367/PR#1379). * Several segmentation faults related to threading were fixed. One where pthread_cancel was called on an improperly initialized thread (#1801), another where threads were being recycled (#1760/PR#1761), and another where threads were improperly handling signals (#1750/PR#1752). * A segmentation fault from calling freeaddrinfo with NULL was fixed (PR#1755). * Some JSON options were fixed, including checking the size for json_read (PR#1709), but the size limit was removed for received server output (PR#1779). * A rcv-timeout error has been fixed. The Nread timeout was hardcoded and timed out before the --rcv-timeout option * There is no longer a limit on the omit time period * Fixed an output crash under 32-bit big-endian systems * An issue was fixed where CPU utilization was unexpectedly high during limited baud rate tests. The --pacing-timer option was removed, but it is still available in the library * Add SCTP information to --json output and fixed compile error when SCTP is not supported (#1731). * --fq-rate was changed from a uint to a uint64 to allow pacing above 32G. Not yet tested on big-endian systems
devel
Dirk Mueller2025-01-27 17:58:32 +00:00
7152ff0e91Accepting request 1224601 from network:utilities
Ana Guerrero
2024-11-17 15:42:14 +00:00
dbc78dfc89Build with OpenSSL for key based authentication supportAeneas Jaißle2024-11-16 23:32:06 +00:00
bf04c260c5Accepting request 1174204 from network:utilities
Ana Guerrero
2024-05-15 19:28:55 +00:00
5df87d344b- update to 3.17.1 (bsc#1224262, CVE-2024-26306): * BREAKING CHANGE: iperf3's authentication features, when used with OpenSSL prior to 3.2.0, contain a vulnerability to a side-channel timing attack. To address this flaw, a change has been made to the padding applied to encrypted strings. This change is not backwards compatible with older versions of iperf3 (before 3.17). To restore the older (vulnerable) behavior, and hence backwards-compatibility, use the --use-pkcs1-padding flag. The iperf3 team thanks Hubert Kario from RedHat for reporting this issue and providing feedback on the fix. (CVE-2024-26306)(PR#1695) * iperf3 no longer changes its current working directory in --daemon mode. This results in more predictable behavior with relative paths, in particular finding key and credential files for authentication. (PR#1672) * A new --json-stream option has been added to enable a streaming output format, consisting of a series of JSON objects (for the start of the test, each measurement interval, and the end of the test) separated by newlines (#444, #923, #1098). * UDP tests now work correctly between different endian hosts * The --fq-rate parameter now works for --reverse tests * The statistics reporting interval is now available in the --json start test object (#1663). * A negative time test duration is now properly flagged as an error (IS#1662 / PR#1666).Dirk Mueller2024-05-15 10:56:09 +00:00
0ce9ae99b3Accepting request 1135291 from network:utilities
Ana Guerrero
2023-12-28 22:01:48 +00:00
c5c638637d- update to 3.16: * Multiple test streams started with -P/--parallel will now be serviced by different threads. This allows iperf3 to take advantage of multiple CPU cores on modern processors, and will generally result in significant throughput increases * OpenSSL 3 is now detected at build time. If OpenSSL 3 is found, various older, deprecated, APIs will not be used. iperf3 will continue to work with OpenSSL 1.1.1. OpenSSL is used as a part of the iperf3 authentication functionality * The authorized users file used by the authentication functionality is now checked for accessibility much earlier during the program startup, as opposed to being checked near the start of a test (Issue #1583, PR #1585). * BREAKING CHANGE: iperf3 now requires pthreads and C atomic variables to compile and run.Dirk Mueller2023-12-27 11:27:06 +00:00
453fd503c2Accepting request 1113658 from network:utilities
Ana Guerrero
2023-09-26 20:00:55 +00:00
6a56638da4* obsoletes CVE-2023-38403.patch in older distsDirk Mueller2023-09-26 11:50:36 +00:00
ef9def5ce4- update to 3.15 (bsc#1215662, ESNET-SECADV-2023-0002):Dirk Mueller2023-09-26 07:05:47 +00:00
347b4e16c4Accepting request 1113223 from network:utilities
Ana Guerrero
2023-09-25 18:02:38 +00:00
9e17dabfc7- update to 3.15: * Several bugs that could allow the iperf3 server to hang waiting for input on the control connection has been fixed (ESnet Software Security Advisory ESNET-SECADV-2023-0002) * A bug that caused garbled output with UDP tests on 32-bit hosts has been fixed (PR #1554, PR #1556). This bug was introduced in iperf-3.14. * A bug in counting UDP messages has been fixed JSON output on CentOS 6 * This maintenance release adds a -1 flag to make the iperf3 execute a single test and exit, needed for an upcoming bwctl there is only one stream. version developed at NLANR/DAST. iperf3 is a new implementation from scratch, with the goal of a smaller, simpler code base, and a library version of the functionality that can be used in other programs. iperf3 also a number of features found in other tools such as nuttcp and netperf, but were missing from the original iperf. These include, for example, a zero-copy mode andDirk Mueller2023-09-23 11:08:07 +00:00
ab3cb6d686Accepting request 1099784 from network:utilities
Ana Guerrero
2023-07-24 16:25:31 +00:00
367945e2c9Accepting request 1099783 from home:dirkmueller:FactoryDirk Mueller2023-07-20 19:11:03 +00:00
d7d4fe7a50Accepting request 1071021 from network:utilities
Dominique Leuenberger
2023-03-13 11:40:17 +00:00
407ba2598fAccepting request 1069836 from home:dirkmueller:FactoryAeneas Jaißle2023-03-12 18:43:10 +00:00
5527304515Accepting request 1040704 from network:utilities
Dominique Leuenberger
2022-12-06 15:42:58 +00:00
3e7a0a5df4Accepting request 1039815 from home:dirkmueller:FactoryMarcus Meissner2022-12-06 14:44:54 +00:00
0705602e01Accepting request 965013 from network:utilities
Dominique Leuenberger
2022-03-26 21:31:09 +00:00
1c1790cf7cAccepting request 958747 from home:msvec:branches:network:utilities
Lars Vogdt
2022-03-26 11:39:39 +00:00
ab217f19bcAccepting request 899921 from network:utilities
Dominique Leuenberger
2021-06-14 21:11:12 +00:00