Hello community,
here is the log from the commit of package glib-networking for openSUSE:Factory
checked in at 2020-01-10 17:46:49
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/glib-networking (Old)
and /work/SRC/openSUSE:Factory/.glib-networking.new.6675 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "glib-networking"
Fri Jan 10 17:46:49 2020 rev:68 rq:761234 version:2.62.3
Changes:
--------
--- /work/SRC/openSUSE:Factory/glib-networking/glib-networking.changes
2019-12-23 22:37:21.609818133 +0100
+++
/work/SRC/openSUSE:Factory/.glib-networking.new.6675/glib-networking.changes
2020-01-10 17:46:54.526145709 +0100
@@ -1,0 +2,10 @@
+Sun Jan 5 14:05:57 UTC 2020 - Bjørn Lie <[email protected]>
+
+- Update to version 2.62.3:
+ + Fix leak of base iostream (or base datagram socket), 2.62
+ regression.
+ + Fix duplicate notifies of peer-certificate and
+ peer-certificate-errors.
+ + Fix obscure corner case where SNI might not work.
+
+-------------------------------------------------------------------
@@ -4 +14 @@
-- Update to version 2.62.1:
+- Update to version 2.62.2:
Old:
----
glib-networking-2.62.2.tar.xz
New:
----
glib-networking-2.62.3.tar.xz
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ glib-networking.spec ++++++
--- /var/tmp/diff_new_pack.1nUBFM/_old 2020-01-10 17:46:55.142146050 +0100
+++ /var/tmp/diff_new_pack.1nUBFM/_new 2020-01-10 17:46:55.146146052 +0100
@@ -1,7 +1,7 @@
#
# spec file for package glib-networking
#
-# Copyright (c) 2019 SUSE LLC
+# Copyright (c) 2020 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
@@ -18,7 +18,7 @@
%define gio_real_package %(rpm -q --qf '%%{name}' --whatprovides gio)
Name: glib-networking
-Version: 2.62.2
+Version: 2.62.3
Release: 0
Summary: Network-related GIO modules for glib
License: LGPL-2.1-or-later
++++++ glib-networking-2.62.2.tar.xz -> glib-networking-2.62.3.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/glib-networking-2.62.2/NEWS
new/glib-networking-2.62.3/NEWS
--- old/glib-networking-2.62.2/NEWS 2019-12-09 20:38:43.000000000 +0100
+++ new/glib-networking-2.62.3/NEWS 2020-01-04 04:43:24.000000000 +0100
@@ -1,4 +1,11 @@
-2.26.2 - December 9, 2019
+2.62.3 - January 3, 2019
+========================
+
+- Fix leak of base iostream (or base datagram socket), 2.62 regression
+- Fix duplicate notifies of peer-certificate and peer-certificate-errors
+- Fix obscure corner case where SNI might not work
+
+2.62.2 - December 9, 2019
=========================
- Fix handshake_context crashes (#97)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore' old/glib-networking-2.62.2/meson.build
new/glib-networking-2.62.3/meson.build
--- old/glib-networking-2.62.2/meson.build 2019-12-09 20:38:43.000000000
+0100
+++ new/glib-networking-2.62.3/meson.build 2020-01-04 04:43:24.000000000
+0100
@@ -1,6 +1,6 @@
project(
'glib-networking', 'c',
- version: '2.62.2',
+ version: '2.62.3',
license: 'LGPL2.1+',
meson_version: '>= 0.50.0',
default_options: ['c_std=c11']
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/glib-networking-2.62.2/tls/base/gtlsconnection-base.c
new/glib-networking-2.62.3/tls/base/gtlsconnection-base.c
--- old/glib-networking-2.62.2/tls/base/gtlsconnection-base.c 2019-12-09
20:38:43.000000000 +0100
+++ new/glib-networking-2.62.3/tls/base/gtlsconnection-base.c 2020-01-04
04:43:24.000000000 +0100
@@ -1306,9 +1306,6 @@
g_cond_signal (&priv->verify_certificate_condition);
g_mutex_unlock (&priv->verify_certificate_mutex);
- g_object_notify (G_OBJECT (tls), "peer-certificate");
- g_object_notify (G_OBJECT (tls), "peer-certificate-errors");
-
return G_SOURCE_REMOVE;
}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/glib-networking-2.62.2/tls/gnutls/gtlsclientconnection-gnutls.c
new/glib-networking-2.62.3/tls/gnutls/gtlsclientconnection-gnutls.c
--- old/glib-networking-2.62.2/tls/gnutls/gtlsclientconnection-gnutls.c
2019-12-09 20:38:43.000000000 +0100
+++ new/glib-networking-2.62.3/tls/gnutls/gtlsclientconnection-gnutls.c
2020-01-04 04:43:24.000000000 +0100
@@ -297,8 +297,15 @@
* initialization */
if (session)
{
+ gchar *normalized_hostname = g_strdup (hostname);
+
+ if (hostname[strlen (hostname) - 1] == '.')
+ normalized_hostname[strlen (hostname) - 1] = '\0';
+
gnutls_server_name_set (session, GNUTLS_NAME_DNS,
- hostname, strlen (hostname));
+ normalized_hostname, strlen
(normalized_hostname));
+
+ g_free (normalized_hostname);
}
}
break;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/glib-networking-2.62.2/tls/gnutls/gtlsconnection-gnutls.c
new/glib-networking-2.62.3/tls/gnutls/gtlsconnection-gnutls.c
--- old/glib-networking-2.62.2/tls/gnutls/gtlsconnection-gnutls.c
2019-12-09 20:38:43.000000000 +0100
+++ new/glib-networking-2.62.3/tls/gnutls/gtlsconnection-gnutls.c
2020-01-04 04:43:24.000000000 +0100
@@ -223,6 +223,8 @@
g_set_error (error, G_TLS_ERROR, G_TLS_ERROR_MISC,
_("Could not create TLS connection: %s"),
gnutls_strerror (status));
+ g_clear_object (&base_io_stream);
+ g_clear_object (&base_socket);
return FALSE;
}
@@ -245,6 +247,9 @@
if (flags & GNUTLS_DATAGRAM)
gnutls_dtls_set_mtu (priv->session, 1400);
+ g_clear_object (&base_io_stream);
+ g_clear_object (&base_socket);
+
return TRUE;
}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn'
'--exclude=.svnignore'
old/glib-networking-2.62.2/tls/openssl/gtlsbackend-openssl.c
new/glib-networking-2.62.3/tls/openssl/gtlsbackend-openssl.c
--- old/glib-networking-2.62.2/tls/openssl/gtlsbackend-openssl.c
2019-12-09 20:38:43.000000000 +0100
+++ new/glib-networking-2.62.3/tls/openssl/gtlsbackend-openssl.c
2020-01-04 04:43:24.000000000 +0100
@@ -62,10 +62,10 @@
#pragma GCC diagnostic ignored "-Wunused-function"
#endif
-static unsigned long
+static size_t
id_cb (void)
{
- return (unsigned long) g_thread_self ();
+ return (size_t) g_thread_self ();
}
static void