Debian Security Advisory

DLA-2271-1 coturn -- LTS security update

Date Reported:
01 Jul 2020
Affected Packages:
coturn
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2020-4067.
More information:

In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the connection of another client.

For Debian 8 Jessie, this problem has been fixed in version 4.2.1.2-1+deb8u2.

We recommend that you upgrade your coturn packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS