Am 13.12.2016 um 00:50 schrieb Jonas Meurer:

> Am 13.12.2016 um 00:45 schrieb Debian Bug Tracking System:
>> The bug was filed agains a "testing" binary package forcefully
>> installed in a Squeeze environment. That binary package was never
>> meant to be used in Squeeze. Coturn heavily relies on OpenSSL and on
>> binary compatibility with OpenSSL libraries. We cannot support that
>> binary in Squeeze. If you absolutely must to use Coturn with Squeeze,
>> then you have to compile Coturn manually from the sources from the
>> project page http://coturn.net.
> 
> Sorry, but in my initial report I confused Squeeze with Stretch. In
> fact, this bug is discovered on Debian Stretch, which is already in
> freeze and supposed to be released as Stable within the next months.
> 
> I keep experiencing this bug almost once a day on the Stretch system
> that runs coturn (along with a Spreed.ME setup).
> 
> As I wrote earlier, the bug might be related to the OpenSSL (1.0 -> 1.1)
> transition that took place in Stretch recently. Probably a simple
> rebuild against OpenSSL 1.1 would fix it. If you like, I could give it a
> try. Would that help?

Ha, just after sending this mail I saw that coturn indeed had been
binNMUed and updated to 4.5.0.5-1+b1 in Stretch. Will figure out whether
the binNMU fixed the segfault and report back in a few days.

Cheers,
 jonas



Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to