Security Advisories (1)
CVE-2009-3024 (2009-08-31)

The verify_hostname_of_cert function in the certificate checking feature in IO-Socket-SSL (IO::Socket::SSL) 1.14 through 1.25 only matches the prefix of a hostname when no wildcard is used, which allows remote attackers to bypass the hostname check for a certificate.

Changes for version 2.067 - 2020-02-14

  • fix memory leak on incomplete handshake https://github.com/noxxi/p5-io-socket-ssl/issues/92 Thanks to olegwtf
  • add support for SSL_MODE_RELEASE_BUFFERS via SSL_mode_release_buffers This can decrease memory usage at the costs of more allocations https://rt.cpan.org/Ticket/Display.html?id=129463
  • more detailed error messages when loading of certificate file failed https://github.com/noxxi/p5-io-socket-ssl/issues/89
  • fix for ip_in_cn == 6 in verify_hostname scheme https://rt.cpan.org/Ticket/Display.html?id=131384
  • deal with new MODE_AUTO_RETRY default in OpenSSL 1.1.1
  • fix warning when no ecdh support is available
  • documentation update regarding use of select and TLS 1.3
  • various fixes in documentation https://github.com/noxxi/p5-io-socket-ssl/issues/91 https://github.com/noxxi/p5-io-socket-ssl/issues/90 https://github.com/noxxi/p5-io-socket-ssl/issues/87 https://github.com/noxxi/p5-io-socket-ssl/issues/81
  • stability fix t/core.t

Modules

SSL sockets with IO::Socket interface
SSL interception (man in the middle)
provide access to Mozilla's list of effective TLD names
loading, storing, creating certificates and keys

Provides

in lib/IO/Socket/SSL.pm
in lib/IO/Socket/SSL.pm
in lib/IO/Socket/SSL.pm
in lib/IO/Socket/SSL.pm
in lib/IO/Socket/SSL.pm