[ubuntu/hirsute-proposed] coturn 4.5.2-1 (Accepted)
Logan Rosen
loganrosen at gmail.com
Sat Jan 16 06:08:27 UTC 2021
coturn (4.5.2-1) unstable; urgency=high
* [49df393] New upstream release (4.5.2)
- fix null pointer dereference in case of out of memory.(by Thomas Moeller)
- merge PR #517 (by wolmi)
add prometheus metrics
- merge PR #637 (by David Florness)
Delete trailing whitespace in example configuration files
- merge PR #631 (by Debabrata Deka)
Add architecture ppc64le to travis build
- merge PR #627 (by Samuel)
Fix misleading option in doc (prometheus)
- merge PR #643 (by tupelo-schneck)
Allow RFC6062 TCP relay data to look like TLS
- merge PR #655 (by plinss)
Add support for proxy protocol V1
- merge PR #618 (by Paul Wayper)
Print full date and time in logs
Add new options:
"new-log-timestamp" and "new-log-timestamp-format"
- merge PR #599 (by Cédric Krier)
Do not use FIPS and remove hardcode OPENSSL_VERSION_NUMBER with LibreSSL
- update Docker mongoDB and fix with workaround the missing systemctl
- merge PR #660 (by Camden Narzt)
fix compilation on macOS Big Sur
- merge PR #546 #551 #672 (by jelmd)
Add support of --acme-redirect <URL>
fix acme security, redundancy, consistency
- Disable binding request logging to avoid DoS attacks.(Breaking change!)
Add new --log-binding option to enable binding request logging
- Fix stale-nonce documentation. Resolves #604
- Version numbering is changed to semver 2.0
- Merge PR #288 (by Hristo Venev)
pkg-config, and various cleanups in configure file
- Add systemd notification for better systemd integration
- Fix Issue #621 (by ycaibb)
Null pointer dereference on tcp_client_input_handler_rfc6062data function
- Fix Issue #600 (by ycaibb)
use-after-free vulnerability on write_to_peerchannel function
- Fix Issue #601 (by ycaibb)
use-after-free vulnerability on write_client_connection function
- Little refactoring prometheus
Fix c++ support
Simplify (as agreed in Issue #666)
Remove session id/allocation labels
Remove per session metrics. We should later add more counters.
- Fix CVE-2020-26262 (credits: Enable-Security)
Fix ipv6 ::1 loopback check
Not allow allocate peer address 0.0.0.0/8 and ::/128
For more details see the github security advisory:
https://github.com/coturn/coturn/security/advisories/GHSA-6g6j-r9rf-cm7p
* [f0c1753] Change coturn service type to systemd notify (Closes: #934513)
* [f9b9547] Add libsystemd-dev to build dependency
* [5a811b1] Update watch version to 4
* [c0a645e] Update Debian Standards to 4.5.1
* [e429100] Patch not-needed to forwarded to upstream
* [bc56267] Add pkg-config to build dependency
* [bd98206] Postrm remove dir /var/lib/turn
* [8c58afe] Change sqlite db permissions.
Change owner to turnserver:turnserver and mode 660 (Closes: #930097)
* [b9a4a8b] Change config file permissions.
Change owner to root:turnserver and mode 640 (Closes: #954379)
* [3e85092] init.d script drop root privileges (Closes: 904415)
* [24eb87a] Add info about binding privileged ports (Closes: #964009)
* [136a8a2] Disable pid file creation
Date: 2021-01-12 16:27:30.817329+00:00
Signed-By: Logan Rosen <loganrosen at gmail.com>
https://launchpad.net/ubuntu/+source/coturn/4.5.2-1
-------------- next part --------------
Sorry, changesfile not available.
More information about the Hirsute-changes
mailing list