File _patchinfo of Package patchinfo.13009

<patchinfo incident="13009">
  <issue tracker="cve" id="2020-4067"/>
  <issue tracker="bnc" id="1173510">VUL-1: CVE-2020-4067: coturn: information leak across client connections</issue>
  <packager>weberho</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for coturn</summary>
  <description>This update for coturn fixes the following issues:

Version 4.5.1.3:

* Remove reference to SSLv3: gh#coturn/coturn#566
* Ignore MD5 for BoringSSL: gh#coturn/coturn#579
* STUN response buffer not initialized properly; he issue found and 
  reported gh#coturn/coturn#583 by Felix D&#246;rre all credits belongs to 
  him. CVE-2020-4067, boo#1173510
- Let coturn allow binding to ports below 1024 per default
</description>
</patchinfo>
openSUSE Build Service is sponsored by