Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140504062625.GA26153@eldamar.local>
Date: Sun, 4 May 2014 08:26:25 +0200
From: Salvatore Bonaccorso <carnil@...ian.org>
To: oss-security@...ts.openwall.com
Cc: Assign a CVE Identifier <cve-assign@...re.org>,
	Steffen Ullrich <coyote.frank@....net>
Subject: Re: Debian Bug#746579: libwww-perl: HTTPS_CA_DIR or
 HTTPS_CA_FILE disables peer certificate verification for IO::Socket::SSL

Hi,

On Fri, May 02, 2014 at 02:54:33PM -0600, Kurt Seifried wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=746579
> 
> Package: libwww-perl
> Version: 6.06-1
> Tags: security
> Usertags: serious
> 
> If LWP uses IO::Socket::SSL as SSL socket class (this is the default),
> setting HTTPS_CA_DIR or HTTPS_CA_FILE environment variable disables(!)
> server cerificate verification:

An update on this issue for the affected versions:

Steffen Ullrich proposed a fix for this in [1]. The issue seem to be
introduced in LWP::Protocol::https in commit[2], which is version
6.04.

 [1] https://github.com/libwww-perl/lwp-protocol-https/pull/14
 [2] https://github.com/dagolden/lwp-protocol-https/commit/bcc46ce2dab53d2e2baa583f2243d6fc7d36dcc8

Regards,
Salvatore

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.