-
coturn (4.5.1.1-1.1ubuntu0.20.04.2) focal-security; urgency=medium
* SECURITY UPDATE: Unsafe loopback interface
- debian/patches/CVE-2020-26262.patch: Add check if address is in
0.0.0.0/8 or ::/128.
- CVE-2020-26262
-- Mészáros Mihály <email address hidden> Mon, 14 Dec 2020 14:50:15 +0100
-
coturn (4.5.1.1-1.1ubuntu0.20.04.1) focal-security; urgency=medium
* SECURITY UPDATE: Heap-buffer overflow in HTTP POST request
- debian/patches/CVE-2020-6061.patch: Fix overflow
- CVE-2020-6061
* SECURITY UPDATE: DoS when parsing certain HTTP POST request
- debian/patches/CVE-2020-6062.patch: Fix parsing of POST requests
- CVE-2020-6062
* SECURITY UPDATE: Information leak between different client connections
- debian/patches/CVE-2020-4067.patch: initialize with zero any new or
reused stun buffers
- CVE-2020-4067
-- Eduardo Barretto <email address hidden> Thu, 02 Jul 2020 10:34:50 -0300
-
coturn (4.5.1.1-1.1build2) focal; urgency=medium
* No-change rebuild for libevent soname changes.
-- Matthias Klose <email address hidden> Sat, 19 Oct 2019 19:55:17 +0000
-
coturn (4.5.1.1-1.1build1) eoan; urgency=medium
* No change rebuild for libmysqlclient21.
-- Robie Basak <email address hidden> Mon, 12 Aug 2019 01:59:37 +0000