This bug was fixed in the package glib-networking - 2.57.90-1 Sponsored for Iain Lane (laney)
--------------- glib-networking (2.57.90-1) experimental; urgency=medium * debian/*: Update for experimental / 2.57 * New upstream release 2.57.90 (LP: #1786809) - Properly check for server errors in connection tests - Perform certificate verification during, not after, TLS handshake - Avoid trailing dots in SNI hostnames - Send fallback SCSV with fallback connection attempts - Fail unsafe rehandshake attempts initiated by API request - Fix memory leaks when calling g_tls_connection_gnutls_get_certificate() - Use GnuTLS system trust and remove build option to specify cert bundle - Fix criticals when child streams outlast the parent GTlsConnection - Fix crash when setting client cert without private key - Never install GIO modules outside build prefix - Don't install test files if installed tests are disabled - Fix build with -Dpkcs11=false - g_tls_certificate_verify() no longer manually verifies certificate activation/expiration time, matching the current behavior of g_tls_database_verify_chain(). * debian/control*: - Remove libp11-kit BD - upstream has disabled this by default now. - Standards-Version → 4.2.0, no changes required. -- Iain Lane <la...@debian.org> Thu, 16 Aug 2018 10:40:20 +0200 ** Changed in: glib-networking (Ubuntu) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1786809 Title: Update to 2.57.90 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/glib-networking/+bug/1786809/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs