Public bug reported: [ Description ]
Upstream have release 2.60.3 in the 2.60 series [ QA ] Upstream release, so QA already performed by maintainers https://wiki.ubuntu.com/StableReleaseUpdates/GNOME Make sure no autopkgtests are regressed by this upload. Suggestion for something explicit to test would be epiphany on secure websites. [ Regression potential ] A broken glib-networking could affect various applications' ability to use networking properly, particularly TLS. [ Upstream NEWS ] 2.60.3 - June 9, 2019 ===================== - Fix clobbering of the thread-default main context after certificate verification failure during async handshakes since 2.60.1 (#85) - Fix GTlsDatabase initialization failures in OpenSSL backend due to uninitialized memory use - Fix minor leak of ALPN protocols 2.60.2 - May 2, 2019 ==================== - OpenSSL backend now defaults to system trust store (#62) - Fix client auth failure error with GnuTLS 3.6.7 (#70) ** Affects: glib-networking (Ubuntu) Importance: Undecided Assignee: Iain Lane (laney) Status: In Progress ** Affects: glib-networking (Ubuntu Disco) Importance: Undecided Assignee: Iain Lane (laney) Status: In Progress ** Also affects: glib-networking (Ubuntu Disco) Importance: Undecided Status: New ** Changed in: glib-networking (Ubuntu) Status: New => In Progress ** Changed in: glib-networking (Ubuntu Disco) Status: New => In Progress ** Changed in: glib-networking (Ubuntu) Assignee: (unassigned) => Iain Lane (laney) ** Changed in: glib-networking (Ubuntu Disco) Assignee: (unassigned) => Iain Lane (laney) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832458 Title: [SRU] 2.60.3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/glib-networking/+bug/1832458/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs