File _patchinfo of Package patchinfo.13009
<patchinfo incident="13009">
<issue tracker="cve" id="2020-4067"/>
<issue tracker="bnc" id="1173510">VUL-1: CVE-2020-4067: coturn: information leak across client connections</issue>
<packager>weberho</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for coturn</summary>
<description>This update for coturn fixes the following issues:
Version 4.5.1.3:
* Remove reference to SSLv3: gh#coturn/coturn#566
* Ignore MD5 for BoringSSL: gh#coturn/coturn#579
* STUN response buffer not initialized properly; he issue found and
reported gh#coturn/coturn#583 by Felix Dörre all credits belongs to
him. CVE-2020-4067, boo#1173510
- Let coturn allow binding to ports below 1024 per default
</description>
</patchinfo>