diff --git a/IO-Socket-SSL-2.055-use-system-default-SSL-version.patch b/IO-Socket-SSL-2.058-use-system-default-SSL-version.patch similarity index 97% rename from IO-Socket-SSL-2.055-use-system-default-SSL-version.patch rename to IO-Socket-SSL-2.058-use-system-default-SSL-version.patch index f47bb01..6f0bce9 100644 --- a/IO-Socket-SSL-2.055-use-system-default-SSL-version.patch +++ b/IO-Socket-SSL-2.058-use-system-default-SSL-version.patch @@ -9,7 +9,7 @@ SSL_verify_callback => undef, SSL_verifycn_scheme => undef, # fallback cn verification SSL_verifycn_publicsuffix => undef, # fallback default list verification -@@ -2269,7 +2269,7 @@ sub new { +@@ -2278,7 +2278,7 @@ sub new { my $ssl_op = $DEFAULT_SSL_OP; diff --git a/perl-IO-Socket-SSL.spec b/perl-IO-Socket-SSL.spec index f10229e..cdb8e32 100644 --- a/perl-IO-Socket-SSL.spec +++ b/perl-IO-Socket-SSL.spec @@ -1,12 +1,12 @@ Name: perl-IO-Socket-SSL -Version: 2.056 -Release: 3%{?dist} +Version: 2.058 +Release: 1%{?dist} Summary: Perl library for transparent SSL License: GPL+ or Artistic URL: https://metacpan.org/release/IO-Socket-SSL -Source0: https://cpan.metacpan.org/authors/id/S/SU/SULLR/IO-Socket-SSL-%{version}.tar.gz +Source0: https://cpan.metacpan.org/modules/by-module/IO/IO-Socket-SSL-%{version}.tar.gz Patch0: IO-Socket-SSL-2.054-use-system-default-cipher-list.patch -Patch1: IO-Socket-SSL-2.055-use-system-default-SSL-version.patch +Patch1: IO-Socket-SSL-2.058-use-system-default-SSL-version.patch BuildArch: noarch # Module Build BuildRequires: coreutils @@ -111,6 +111,21 @@ make test %{_mandir}/man3/IO::Socket::SSL::Utils.3* %changelog +* Thu Jul 19 2018 Paul Howarth - 2.058-1 +- Update to 2.058 + - Fix memory leak that occured with explicit stop_SSL in connection with + non-blocking sockets or timeout (CPAN RT#125867) + - Fix redefine warnings in case Socket6 is installed but neither + IO::Socket::IP nor IO::Socket::INET6 (CPAN RT#124963) + - IO::Socket::SSL::Intercept - optional 'serial' argument can be starting + number or callback to create serial number based on the original certificate + - New function get_session_reused to check if a session got reused + - IO::Socket::SSL::Utils::CERT_asHash: fingerprint_xxx now set to the correct + value + - Fix t/session_ticket.t: It failed with OpenSSL 1.1.* since this version + expects the extKeyUsage of clientAuth in the client cert also to be allowed + by the CA if CA uses extKeyUsage + * Fri Jul 13 2018 Fedora Release Engineering - 2.056-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild diff --git a/sources b/sources index 3662d3f..6f34b9c 100644 --- a/sources +++ b/sources @@ -1 +1 @@ -SHA512 (IO-Socket-SSL-2.056.tar.gz) = a3d580f977f8fd99f196a710f6eb5bc649d46e22d17f4e02660b2bab130629b34d1aff037974f320ce52121b13c1d77aa2f504278ec50530667e67413442b70b +SHA512 (IO-Socket-SSL-2.058.tar.gz) = 87701f107fa44f20661fc0ed214f6910382ff2c2a9054215353b42daea57f77b4fc2eecb753128ebdcf82e834c448a2bce07967cbbe186e2e0e0a78419a4850f