diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 19:33:14 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-07 19:33:14 +0000 |
commit | 36d22d82aa202bb199967e9512281e9a53db42c9 (patch) | |
tree | 105e8c98ddea1c1e4784a60a5a6410fa416be2de /security/nss/doc/rst/legacy/nss_releases/nss_3.17.1_release_notes/index.rst | |
parent | Initial commit. (diff) | |
download | firefox-esr-upstream.tar.xz firefox-esr-upstream.zip |
Adding upstream version 115.7.0esr.upstream/115.7.0esrupstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'security/nss/doc/rst/legacy/nss_releases/nss_3.17.1_release_notes/index.rst')
-rw-r--r-- | security/nss/doc/rst/legacy/nss_releases/nss_3.17.1_release_notes/index.rst | 132 |
1 files changed, 132 insertions, 0 deletions
diff --git a/security/nss/doc/rst/legacy/nss_releases/nss_3.17.1_release_notes/index.rst b/security/nss/doc/rst/legacy/nss_releases/nss_3.17.1_release_notes/index.rst new file mode 100644 index 0000000000..cc1f7a711a --- /dev/null +++ b/security/nss/doc/rst/legacy/nss_releases/nss_3.17.1_release_notes/index.rst @@ -0,0 +1,132 @@ +.. _mozilla_projects_nss_nss_3_17_1_release_notes: + +NSS 3.17.1 release notes +======================== + +`Introduction <#introduction>`__ +-------------------------------- + +.. container:: + + Network Security Services (NSS) 3.17.1 is a patch release for NSS 3.17. The bug fixes in NSS + 3.17.1 are described in the "Bugs Fixed" section below. + +.. _distribution_information: + +`Distribution Information <#distribution_information>`__ +-------------------------------------------------------- + +.. container:: + + The HG tag is NSS_3_17_1_RTM. NSS 3.17.1 requires NSPR 4.10.7 or newer. + + NSS 3.17.1 source distributions are available on ftp.mozilla.org for secure HTTPS download: + + - Source tarballs: + https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_17_1_RTM/src/ + +.. _security_advisories: + +`Security Advisories <#security_advisories>`__ +---------------------------------------------- + +.. container:: + + The following security-relevant bugs have been resolved in NSS 3.17.1. Users are encouraged to + upgrade immediately. + + - `Bug 1064636 <https://bugzilla.mozilla.org/show_bug.cgi?id=1064636>`__ - (CVE-2014-1568) RSA + Signature Forgery in NSS. See also `MFSA + 2014-73 <https://www.mozilla.org/security/announce/2014/mfsa2014-73.html>`__ for details. + +.. _new_in_nss_3.17.1: + +`New in NSS 3.17.1 <#new_in_nss_3.17.1>`__ +------------------------------------------ + +.. container:: + + This patch release adds new functionality and fixes a bug that caused NSS to accept forged RSA + signatures. + + A new symbol, \_SGN_VerifyPKCS1DigestInfo is exported in this release. As with all exported NSS + symbols that have a leading underscore '_', this is an internal symbol for NSS use only. + Applications that use or depend on these symbols can and will break in future NSS releases. + +.. _new_functionality: + +`New Functionality <#new_functionality>`__ +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + +.. container:: + + - `TLS_FALLBACK_SCSV <https://datatracker.ietf.org/doc/html/draft-ietf-tls-downgrade-scsv-00>`__ + is a signaling cipher suite value that indicates a handshake is the result of TLS version + fallback. + + .. rubric:: New Macros + :name: new_macros + + - *in ssl.h* + + - **SSL_ENABLE_FALLBACK_SCSV** - an SSL socket option that enables TLS_FALLBACK_SCSV. Off by + default. + + - *in sslerr.h* + + - **SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT** - a new SSL error code. + + - *in sslproto.h* + + - **TLS_FALLBACK_SCSV** - a signaling cipher suite value that indicates a handshake is the + result of TLS version fallback. + +.. _notable_changes_in_nss_3.17.1: + +`Notable Changes in NSS 3.17.1 <#notable_changes_in_nss_3.17.1>`__ +------------------------------------------------------------------ + +.. container:: + + - `Signature algorithms now use SHA-256 instead of SHA-1 by + default <https://bugzilla.mozilla.org/show_bug.cgi?id=1058933>`__. + - Added support for Linux on little-endian powerpc64. + +.. _bugs_fixed_in_nss_3.17.1: + +`Bugs fixed in NSS 3.17.1 <#bugs_fixed_in_nss_3.17.1>`__ +-------------------------------------------------------- + +.. container:: + + | This Bugzilla query returns all the bugs fixed in NSS 3.17.1: + | https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&classification=Components&query_format=advanced&product=NSS&target_milestone=3.17.1 + +`Acknowledgements <#acknowledgements>`__ +---------------------------------------- + +.. container:: + + The NSS development team would like to thank Antoine Delignat-Lavaud, security researcher at + Inria Paris in team Prosecco, and the Advanced Threat Research team at Intel Security, who both + independently discovered and reported this issue, for responsibly disclosing the issue by + providing advance copies of their research. + +`Compatibility <#compatibility>`__ +---------------------------------- + +.. container:: + + NSS 3.17.1 shared libraries are backward compatible with all older NSS 3.x shared libraries. A + program linked with older NSS 3.x shared libraries will work with NSS 3.17.1 shared libraries + without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs + to the functions listed in NSS Public Functions will remain compatible with future versions of + the NSS shared libraries. + +`Feedback <#feedback>`__ +------------------------ + +.. container:: + + Bugs discovered should be reported by filing a bug report with + `bugzilla.mozilla.org <https://bugzilla.mozilla.org/enter_bug.cgi?product=NSS>`__ (product NSS).
\ No newline at end of file |