Hello community,

here is the log from the commit of package glib-networking for openSUSE:Factory 
checked in at 2020-01-10 17:46:49
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/glib-networking (Old)
 and      /work/SRC/openSUSE:Factory/.glib-networking.new.6675 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "glib-networking"

Fri Jan 10 17:46:49 2020 rev:68 rq:761234 version:2.62.3

Changes:
--------
--- /work/SRC/openSUSE:Factory/glib-networking/glib-networking.changes  
2019-12-23 22:37:21.609818133 +0100
+++ 
/work/SRC/openSUSE:Factory/.glib-networking.new.6675/glib-networking.changes    
    2020-01-10 17:46:54.526145709 +0100
@@ -1,0 +2,10 @@
+Sun Jan  5 14:05:57 UTC 2020 - Bjørn Lie <[email protected]>
+
+- Update to version 2.62.3:
+  + Fix leak of base iostream (or base datagram socket), 2.62
+    regression.
+  + Fix duplicate notifies of peer-certificate and
+    peer-certificate-errors.
+  + Fix obscure corner case where SNI might not work.
+
+-------------------------------------------------------------------
@@ -4 +14 @@
-- Update to version 2.62.1:
+- Update to version 2.62.2:

Old:
----
  glib-networking-2.62.2.tar.xz

New:
----
  glib-networking-2.62.3.tar.xz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ glib-networking.spec ++++++
--- /var/tmp/diff_new_pack.1nUBFM/_old  2020-01-10 17:46:55.142146050 +0100
+++ /var/tmp/diff_new_pack.1nUBFM/_new  2020-01-10 17:46:55.146146052 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package glib-networking
 #
-# Copyright (c) 2019 SUSE LLC
+# Copyright (c) 2020 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -18,7 +18,7 @@
 
 %define gio_real_package %(rpm -q --qf '%%{name}' --whatprovides gio)
 Name:           glib-networking
-Version:        2.62.2
+Version:        2.62.3
 Release:        0
 Summary:        Network-related GIO modules for glib
 License:        LGPL-2.1-or-later

++++++ glib-networking-2.62.2.tar.xz -> glib-networking-2.62.3.tar.xz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/glib-networking-2.62.2/NEWS 
new/glib-networking-2.62.3/NEWS
--- old/glib-networking-2.62.2/NEWS     2019-12-09 20:38:43.000000000 +0100
+++ new/glib-networking-2.62.3/NEWS     2020-01-04 04:43:24.000000000 +0100
@@ -1,4 +1,11 @@
-2.26.2 - December 9, 2019
+2.62.3 - January 3, 2019
+========================
+
+- Fix leak of base iostream (or base datagram socket), 2.62 regression
+- Fix duplicate notifies of peer-certificate and peer-certificate-errors
+- Fix obscure corner case where SNI might not work
+
+2.62.2 - December 9, 2019
 =========================
 
 - Fix handshake_context crashes (#97)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/glib-networking-2.62.2/meson.build 
new/glib-networking-2.62.3/meson.build
--- old/glib-networking-2.62.2/meson.build      2019-12-09 20:38:43.000000000 
+0100
+++ new/glib-networking-2.62.3/meson.build      2020-01-04 04:43:24.000000000 
+0100
@@ -1,6 +1,6 @@
 project(
   'glib-networking', 'c',
-  version: '2.62.2',
+  version: '2.62.3',
   license: 'LGPL2.1+',
   meson_version: '>= 0.50.0',
   default_options: ['c_std=c11']
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/glib-networking-2.62.2/tls/base/gtlsconnection-base.c 
new/glib-networking-2.62.3/tls/base/gtlsconnection-base.c
--- old/glib-networking-2.62.2/tls/base/gtlsconnection-base.c   2019-12-09 
20:38:43.000000000 +0100
+++ new/glib-networking-2.62.3/tls/base/gtlsconnection-base.c   2020-01-04 
04:43:24.000000000 +0100
@@ -1306,9 +1306,6 @@
   g_cond_signal (&priv->verify_certificate_condition);
   g_mutex_unlock (&priv->verify_certificate_mutex);
 
-  g_object_notify (G_OBJECT (tls), "peer-certificate");
-  g_object_notify (G_OBJECT (tls), "peer-certificate-errors");
-
   return G_SOURCE_REMOVE;
 }
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/glib-networking-2.62.2/tls/gnutls/gtlsclientconnection-gnutls.c 
new/glib-networking-2.62.3/tls/gnutls/gtlsclientconnection-gnutls.c
--- old/glib-networking-2.62.2/tls/gnutls/gtlsclientconnection-gnutls.c 
2019-12-09 20:38:43.000000000 +0100
+++ new/glib-networking-2.62.3/tls/gnutls/gtlsclientconnection-gnutls.c 
2020-01-04 04:43:24.000000000 +0100
@@ -297,8 +297,15 @@
            * initialization */
           if (session)
             {
+              gchar *normalized_hostname = g_strdup (hostname);
+
+              if (hostname[strlen (hostname) - 1] == '.')
+                normalized_hostname[strlen (hostname) - 1] = '\0';
+
               gnutls_server_name_set (session, GNUTLS_NAME_DNS,
-                                      hostname, strlen (hostname));
+                                      normalized_hostname, strlen 
(normalized_hostname));
+
+              g_free (normalized_hostname);
             }
         }
       break;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/glib-networking-2.62.2/tls/gnutls/gtlsconnection-gnutls.c 
new/glib-networking-2.62.3/tls/gnutls/gtlsconnection-gnutls.c
--- old/glib-networking-2.62.2/tls/gnutls/gtlsconnection-gnutls.c       
2019-12-09 20:38:43.000000000 +0100
+++ new/glib-networking-2.62.3/tls/gnutls/gtlsconnection-gnutls.c       
2020-01-04 04:43:24.000000000 +0100
@@ -223,6 +223,8 @@
       g_set_error (error, G_TLS_ERROR, G_TLS_ERROR_MISC,
                    _("Could not create TLS connection: %s"),
                    gnutls_strerror (status));
+      g_clear_object (&base_io_stream);
+      g_clear_object (&base_socket);
       return FALSE;
     }
 
@@ -245,6 +247,9 @@
   if (flags & GNUTLS_DATAGRAM)
     gnutls_dtls_set_mtu (priv->session, 1400);
 
+  g_clear_object (&base_io_stream);
+  g_clear_object (&base_socket);
+
   return TRUE;
 }
 
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/glib-networking-2.62.2/tls/openssl/gtlsbackend-openssl.c 
new/glib-networking-2.62.3/tls/openssl/gtlsbackend-openssl.c
--- old/glib-networking-2.62.2/tls/openssl/gtlsbackend-openssl.c        
2019-12-09 20:38:43.000000000 +0100
+++ new/glib-networking-2.62.3/tls/openssl/gtlsbackend-openssl.c        
2020-01-04 04:43:24.000000000 +0100
@@ -62,10 +62,10 @@
 #pragma GCC diagnostic ignored "-Wunused-function"
 #endif
 
-static unsigned long
+static size_t
 id_cb (void)
 {
-  return (unsigned long) g_thread_self ();
+  return (size_t) g_thread_self ();
 }
 
 static void


Reply via email to