perl-LWP-Protocol-https/LWP-Protocol-https-6.09-systemca.diff
Dirk Stoecker bd51d54ad1 Accepting request 1103525 from devel:languages:perl:autoupdate
- new version format, see https://github.com/openSUSE/cpanspec/issues/47
- Remove CVE-2014-3230.patch, upstream was fixed. CVE-2014-3230, Debian #746576
- Update LWP-Protocol-https-6.09-systemca.diff
- updated to 6.11
   see /usr/share/doc/packages/perl-LWP-Protocol-https/Changes
  6.11      2023-07-09 15:10:30Z
      - Remove Authority section from dist.ini (GH#64) (Olaf Alders)
      - Add very basic diagnostic information via test (GH#73) (Olaf Alders)
      - CVE-2014-3230 - don't disable verification if only hostnames should not
        (GH#14) (Steffen Ullrich)
      - Make explicit requirement of Mozilla::CA obsolete (GH#72) (Steffen
        Ullrich and Olaf Alders)
      - Remove _in_san and _cn_match. Empty out the _check_sock hook (GH#71)
        (Chase Whitener)
      - Use warnings (GH#69) (Pete Houston)

OBS-URL: https://build.opensuse.org/request/show/1103525
OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/perl-LWP-Protocol-https?expand=0&rev=21
2023-08-14 15:50:24 +00:00

15 lines
622 B
Diff

diff --git a/lib/LWP/Protocol/https.pm b/lib/LWP/Protocol/https.pm
index 16fce19..b1a18df 100644
--- a/lib/LWP/Protocol/https.pm
+++ b/lib/LWP/Protocol/https.pm
@@ -28,7 +28,8 @@ sub _extra_sock_opts
$ssl_opts{SSL_verifycn_scheme} = 'none';
}
}
- if ($ssl_opts{SSL_verify_mode}) {
+ my $suse_allows_mozilla_ca = 0;
+ if ($suse_allows_mozilla_ca && $ssl_opts{SSL_verify_mode}) {
unless (exists $ssl_opts{SSL_ca_file} || exists $ssl_opts{SSL_ca_path}) {
if ($Net::HTTPS::SSL_SOCKET_CLASS eq 'IO::Socket::SSL'
&& defined &IO::Socket::SSL::default_ca