This bug was fixed in the package glib-networking - 2.57.90-1
Sponsored for Iain Lane (laney)
---------------
glib-networking (2.57.90-1) experimental; urgency=medium
* debian/*: Update for experimental / 2.57
* New upstream release 2.57.90 (LP: #1786809)
- Properly check for server errors in connection tests
- Perform certificate verification during, not after, TLS handshake
- Avoid trailing dots in SNI hostnames
- Send fallback SCSV with fallback connection attempts
- Fail unsafe rehandshake attempts initiated by API request
- Fix memory leaks when calling g_tls_connection_gnutls_get_certificate()
- Use GnuTLS system trust and remove build option to specify cert bundle
- Fix criticals when child streams outlast the parent GTlsConnection
- Fix crash when setting client cert without private key
- Never install GIO modules outside build prefix
- Don't install test files if installed tests are disabled
- Fix build with -Dpkcs11=false
- g_tls_certificate_verify() no longer manually verifies certificate
activation/expiration time, matching the current behavior of
g_tls_database_verify_chain().
* debian/control*:
- Remove libp11-kit BD - upstream has disabled this by default now.
- Standards-Version → 4.2.0, no changes required.
-- Iain Lane <[email protected]> Thu, 16 Aug 2018 10:40:20 +0200
** Changed in: glib-networking (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1786809
Title:
Update to 2.57.90
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glib-networking/+bug/1786809/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs