← Back to team overview

desktop-packages team mailing list archive

[Bug 1401069] Update Released

 

The verification of the Stable Release Update for glib-networking has
completed successfully and the package has now been released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to glib-networking in Ubuntu.
https://bugs.launchpad.net/bugs/1401069

Title:
  [SRU] New stable release 2.42.1

Status in glib-networking package in Ubuntu:
  Fix Released
Status in glib-networking source package in Utopic:
  Fix Released

Bug description:
  [ Description ]

  Upload this stable bugfix release

  2.42.1
  ======

    * The GTlsClientConnection "use-ssl3" property now falls back to TLS
      1.0 if SSL 3.0 has been disabled, rather than just failing. Also,
      we now use the gnutls %LATEST_RECORD_VERSION option by default (to
      allow connecting to certain servers that were incorrectly patched
      for the POODLE attack), but also make sure to remove that option
      in the fallback ("use-ssl3") mode (to allow connecting to other
      servers that are differently broken). (#738633, #740087, Dan
      Winship)

    * tls/gnutls: Miscellaneous warning, debugging, and leak fixes
      (#736757, #736809, #737106, Philip Withnall)

    * New/updated translations:
  	Kazakh

  [ QA & regression potential ]

  Under the GNOME MRE, assume the bugs are fixed. Installl the update &
  use your system as normal. If we don't see any regressions either
  manually or on errors, we're good.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glib-networking/+bug/1401069/+subscriptions


References