forked from pool/perl-LWP-Protocol-https
- new version format, see https://github.com/openSUSE/cpanspec/issues/47 - Remove CVE-2014-3230.patch, upstream was fixed. CVE-2014-3230, Debian #746576 - Update LWP-Protocol-https-6.09-systemca.diff - updated to 6.11 see /usr/share/doc/packages/perl-LWP-Protocol-https/Changes 6.11 2023-07-09 15:10:30Z - Remove Authority section from dist.ini (GH#64) (Olaf Alders) - Add very basic diagnostic information via test (GH#73) (Olaf Alders) - CVE-2014-3230 - don't disable verification if only hostnames should not (GH#14) (Steffen Ullrich) - Make explicit requirement of Mozilla::CA obsolete (GH#72) (Steffen Ullrich and Olaf Alders) - Remove _in_san and _cn_match. Empty out the _check_sock hook (GH#71) (Chase Whitener) - Use warnings (GH#69) (Pete Houston) OBS-URL: https://build.opensuse.org/request/show/1103525 OBS-URL: https://build.opensuse.org/package/show/devel:languages:perl/perl-LWP-Protocol-https?expand=0&rev=21
15 lines
622 B
Diff
15 lines
622 B
Diff
diff --git a/lib/LWP/Protocol/https.pm b/lib/LWP/Protocol/https.pm
|
|
index 16fce19..b1a18df 100644
|
|
--- a/lib/LWP/Protocol/https.pm
|
|
+++ b/lib/LWP/Protocol/https.pm
|
|
@@ -28,7 +28,8 @@ sub _extra_sock_opts
|
|
$ssl_opts{SSL_verifycn_scheme} = 'none';
|
|
}
|
|
}
|
|
- if ($ssl_opts{SSL_verify_mode}) {
|
|
+ my $suse_allows_mozilla_ca = 0;
|
|
+ if ($suse_allows_mozilla_ca && $ssl_opts{SSL_verify_mode}) {
|
|
unless (exists $ssl_opts{SSL_ca_file} || exists $ssl_opts{SSL_ca_path}) {
|
|
if ($Net::HTTPS::SSL_SOCKET_CLASS eq 'IO::Socket::SSL'
|
|
&& defined &IO::Socket::SSL::default_ca
|