Opened 11 years ago
Closed 11 years ago
#6545 closed enhancement (fixed)
nss-3.19.1
| Reported by: | Fernando de Oliveira | Owned by: | Fernando de Oliveira |
|---|---|---|---|
| Priority: | normal | Milestone: | 7.8 |
| Component: | BOOK | Version: | SVN |
| Severity: | normal | Keywords: | |
| Cc: |
Description
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_19_1_RTM/src/nss-3.19.1.tar.gz
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_19_1_RTM/src/SHA256SUMS
b7be709551ec13206d8e3e8c065b894fa981c11573115e9478fa051029c52fff
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes
New in NSS 3.19.1
New Functionality
No new functionality is introduced in this release. This patch release includes
a fix for the recently published logjam attack.
Notable Changes in NSS 3.19.1
• The minimum strength of keys that libssl will accept for finite field
algorithms (RSA, Diffie-Hellman, and DSA) have been increased to 1023
bits (bug 1138554).
• NSS reports the bit length of keys more accurately. Thus, the
SECKEY_PublicKeyStrength and SECKEY_PublicKeyStrengthInBits functions
could report smaller values for values that have leading zero values.
This affects the key strength values that are reported by
SSL_GetChannelInfo.
Bugs fixed in NSS 3.19.1
This Bugzilla query returns all the bugs fixed in NSS 3.19.1
Change History (2)
comment:1 by , 11 years ago
| Owner: | changed from to |
|---|---|
| Status: | new → assigned |
comment:2 by , 11 years ago
| Resolution: | → fixed |
|---|---|
| Status: | assigned → closed |
Note:
See TracTickets
for help on using tickets.

Fixed at r16046.