From: Adolf Belka <adolf.belka@ipfire.org>
To: development@lists.ipfire.org
Cc: Adolf Belka <adolf.belka@ipfire.org>
Subject: [PATCH] iperf3: Update to version 3.19
Date: Tue, 20 May 2025 11:09:25 +0200 [thread overview]
Message-ID: <20250520090927.3663-2-adolf.belka@ipfire.org> (raw)
In-Reply-To: <20250520090927.3663-1-adolf.belka@ipfire.org>
- Update from version 3.16 to 3.19
- Update of rootfile not required
- CVE fix in version 3.18 and another in 3.17. The CVE fix in 3.17 results in a breaking
change. The vulnerable option can be enabled in the build but that doesn't seem to be
a good approach for IPFire. I am not sure that the non backwards compatible changed
padding on encrypted strings would create a problem for us. I suspect this is more
if iperf3 is being used in a continuous measuring mode and in IPFire it is an addon
that is used to measure throughput rates when required.
- Changelog
3.19
Notable user-visible changes
iperf3 now supports the use of Multi-Path TCP (MPTCPv1) on Linux
with the use of the -m or --mptcp flag. (PR #1661)
iperf3 now supports a --cntl-ka option to enable TCP keepalives
on the control connection. (#812, #835, PR #1423)
iperf3 now supports the MSG_TRUNC receive option, specified by
the --skip-rx-copy. This theoretically improves the rated
throughput of tests at high bitrates by not delivering network
payload data to userspace. (#1678, PR #1717)
A bug that caused the bitrate setting to be ignored when bursts
are set, has been fixed. (#1773, #1820, PR #1821, PR #1848)
The congestion control protocol setting, if used, is now
properly reset between tests. (PR #1812)
iperf3 now exits with a non-error 0 exit code if exiting via a
SIGTERM, SIGHUP, or SIGINT. (#1009, PR# 1829)
The current behavior of iperf3 with respect to the -n and -k
options is now documented as correct. (#1768, #1775, #596, PR #1800)
Notable developer-visible changes
iperf3 now supports a callback function to get the JSON output
strings. (#1711, PR #1798)
iperf3 now builds correctly with gcc-15 (#1838, PR #1805)
Various memory leaks were fixed (#1881, PR#1823, #1814, PR#1822)
A potential segfault crash was fixed (#1807)
Improved warning messages when reading malformed JSON messages
(PR #1817)
The Github CI configuration was changed to use a more up-to-date
set of runners (PR #1864)
3.18
Notable user-visible changes
SECURITY NOTE: Thanks to Leonid Krolle Bi.Zone for discovering a
JSON type security vulnerability that caused a
segmentation fault in the
server. (CVE-2024-53580) This has now been
fixed. (PR#1810)
UDP packets per second now reports the correct number of
packets, by reporting NET_SOFTERROR if there's a EAGAIN/EINTR
errno if no data was sent (#1367/PR#1379).
Several segmentation faults related to threading were fixed. One
where pthread_cancel was called on an improperly initialized
thread (#1801), another where threads were being recycled
(#1760/PR#1761), and another where threads were improperly
handling signals (#1750/PR#1752).
A segmentation fault from calling freeaddrinfo with NULL was
fixed (PR#1755).
Some JSON options were fixed, including checking the size for
json_read (PR#1709), but the size limit was removed for
received server output (PR#1779).
A rcv-timeout error has been fixed. The Nread timeout was
hardcoded and timed out before the --rcv-timeout option
(PR#1744).
There is no longer a limit on the omit time period
(#1770/PR#1774).
Fixed an output crash under 32-bit big-endian systems (PR#1713).
An issue was fixed where CPU utilization was unexpectedly high
during limited baud rate tests. The --pacing-timer option was
removed, but it is still available in the library
(#1741/PR#1743).
Add SCTP information to --json output and fixed compile error
when SCTP is not supported (#1731).
--fq-rate was changed from a uint to a uint64 to allow pacing above
32G. Not yet tested on big-endian systems (PR#1728).
Notable developer-visible changes
Clang compilation failure on Android were fixed (PR#1687).
iperf_time_add() was optimizated to improve performance
(PR#1742).
Debug messages were added when the state changes (PR#1734).
To increase performance, the old UDP prot_listener is cleared
and removed after each test (PR#1708).
A file descriptor leak was closed (PR#1619).
3.17.1
Notable user-visible changes
Version number has been corrected. (#1699)
Notable developer-visible changes
No longer signing tags
3.17
Notable user-visible changes
BREAKING CHANGE: iperf3's authentication features, when used with
OpenSSL prior to 3.2.0, contain a vulnerability to a side-channel
timing attack. To address this flaw, a change has been made to the
padding applied to encrypted strings. This change is not backwards
compatible with older versions of iperf3 (before 3.17). To restore
the older (vulnerable) behavior, and hence
backwards-compatibility, use the --use-pkcs1-padding flag. The
iperf3 team thanks Hubert Kario from RedHat for reporting this
issue and providing feedback on the fix. (CVE-2024-26306)(PR#1695)
iperf3 no longer changes its current working directory in --daemon
mode. This results in more predictable behavior with relative
paths, in particular finding key and credential files for
authentication. (PR#1672)
A new --json-stream option has been added to enable a streaming
output format, consisting of a series of JSON objects (for the
start of the test, each measurement interval, and the end of the
test) separated by newlines (#444, #923, #1098).
UDP tests now work correctly between different endian hosts
(#1415).
The --fq-rate parameter now works for --reverse tests (#1632, PR#1667).
The statistics reporting interval is now available in the --json
start test object (#1663).
A negative time test duration is now properly flagged as an error
(IS#1662 / PR#1666).
Notable developer-visible changes
Fixes have been made to better (unofficially) support builds on
Android (#1641 / #1651) and VxWorks (#1595).
iperf3 now builds correctly on architectures without native
support for 64-bit atomic types, by linking with the libatomic
library (#1611).
Signed-off-by: Adolf Belka <adolf.belka@ipfire.org>
---
lfs/iperf3 | 11 ++++++-----
1 file changed, 6 insertions(+), 5 deletions(-)
diff --git a/lfs/iperf3 b/lfs/iperf3
index 4ea5a7e69..dbbc5a5ce 100644
--- a/lfs/iperf3
+++ b/lfs/iperf3
@@ -1,7 +1,7 @@
###############################################################################
# #
# IPFire.org - A linux based firewall #
-# Copyright (C) 2007-2023 IPFire Team <info@ipfire.org> #
+# Copyright (C) 2007-2025 IPFire Team <info@ipfire.org> #
# #
# This program is free software: you can redistribute it and/or modify #
# it under the terms of the GNU General Public License as published by #
@@ -26,7 +26,7 @@ include Config
SUMMARY = A tool to measure network performance
-VER = 3.16
+VER = 3.19
THISAPP = iperf-$(VER)
DL_FILE = $(THISAPP).tar.gz
@@ -34,7 +34,7 @@ DL_FROM = $(URL_IPFIRE)
DIR_APP = $(DIR_SRC)/$(THISAPP)
TARGET = $(DIR_INFO)/$(THISAPP)
PROG = iperf3
-PAK_VER = 7
+PAK_VER = 8
DEPS =
@@ -51,7 +51,7 @@ objects = $(DL_FILE)
$(DL_FILE) = $(DL_FROM)/$(DL_FILE)
-$(DL_FILE)_BLAKE2 = 4ca930b58c54d5ae5b0c8b14aca2556224ff2c7b943d32e65486dc2a7e1abd2d26b229e9f759358c326be8754e88a203e11a3ab0f029daa982375a880c3f1cbd
+$(DL_FILE)_BLAKE2 = b6f5e9bdef5ee3fc38bef893144bc6ad003ccbc7b3db4793dbd2aec5998faa55cac215a0db06ab37729dc1c05787ebacbf09db8a6e6517f82492a6c67ec3d9e6
install : $(TARGET)
check : $(patsubst %,$(DIR_CHK)/%,$(objects))
@@ -84,7 +84,8 @@ $(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects))
@$(PREBUILD)
@rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar zxf $(DIR_DL)/$(DL_FILE)
$(UPDATE_AUTOMAKE)
- cd $(DIR_APP) && ./configure --prefix=/usr
+ cd $(DIR_APP) && ./configure \
+ --prefix=/usr
cd $(DIR_APP) && make $(MAKETUNING) $(EXTRA_MAKE)
cd $(DIR_APP) && make install
@rm -rf $(DIR_APP)
--
2.49.0
next prev parent reply other threads:[~2025-05-20 9:09 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-05-20 9:09 [PATCH] iana-etc: Update to version 20250505 Adolf Belka
2025-05-20 9:09 ` Adolf Belka [this message]
2025-05-20 9:09 ` [PATCH] libgcrypt: Update to version 1.11.1 Adolf Belka
2025-05-20 9:09 ` [PATCH] man-pages: Update to version 6.14 Adolf Belka
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250520090927.3663-2-adolf.belka@ipfire.org \
--to=adolf.belka@ipfire.org \
--cc=development@lists.ipfire.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox