Uploaded image for project: 'RHEL'
  1. RHEL
  2. RHEL-46839

Rebase NSS to 3.101 for Firefox [rhel-10.0]

Linking RHIVOS CVEs to...Migration: Automation ...SWIFT: POC ConversionSync from "Extern...XMLWordPrintable

    • nss-3.101.0-1.el10
    • None
    • Moderate
    • Rebase
    • 1
    • rhel-security-crypto
    • ssg_security
    • 30
    • 0.1
    • False
    • False
    • Hide

      None

      Show
      None
    • Yes
    • Crypto24Q3
    • Hide
      • DTLS 1.3: can be negotiated by default
      • "XYBER768D00': should be off by default,
        i.e., not negotable even if it's the only kex enabled
      • Certificate compression:
      • is advertised by default
      • smoke-tested against openssl for both server and client certificates
      • (optional) smoke-tested against gnutls for both server and client certificates
      • (optional) for zlib certificate decompressing to longer than uncompressed_length,
        nss server rejects the connection with `bad certificate` alert,
        and extra memory usage does not exceed 2^25 (32 MB)
      • EdDSA:
      • NSS can connect to itself using using Ed25519 server and client certificates
      • NSS can connect to itself using using Ed448 server and client certificates
      • (optional) run the available tlsfuzzer/test-tls13-eddsa-in-certificate-verify checks
      • RSA OAEP:
        (optional) can decrypt RSA-OAEP padded message
        encrypted by openssl/gnutls and vice versa
      • dbtool: is shipped under unsupported directory
      • PBMAC1:
        smoke-test that openssl/gnutls can export/import files used by nss
        using all three of SHA-256, SHA-384 and SHA-512
      • RSA-PSS certificates with keys shorter than 2048 stop working
      Show
      DTLS 1.3: can be negotiated by default "XYBER768D00': should be off by default, i.e., not negotable even if it's the only kex enabled Certificate compression: is advertised by default smoke-tested against openssl for both server and client certificates (optional) smoke-tested against gnutls for both server and client certificates (optional) for zlib certificate decompressing to longer than uncompressed_length, nss server rejects the connection with `bad certificate` alert, and extra memory usage does not exceed 2^25 (32 MB) EdDSA: NSS can connect to itself using using Ed25519 server and client certificates NSS can connect to itself using using Ed448 server and client certificates (optional) run the available tlsfuzzer/test-tls13-eddsa-in-certificate-verify checks RSA OAEP: (optional) can decrypt RSA-OAEP padded message encrypted by openssl/gnutls and vice versa dbtool: is shipped under unsupported directory PBMAC1: smoke-test that openssl/gnutls can export/import files used by nss using all three of SHA-256, SHA-384 and SHA-512 RSA-PSS certificates with keys shorter than 2048 stop working
    • Pass
    • None
    • Rebase
    • Hide
      .NSS rebased to 3.112

      The NSS cryptographic toolkit packages have been rebased to upstream version 3.112, which provides many improvements and fixes. Most notably, the following:

      * DTLS 1.3 protocol is now supported (RFC 9147).
      * PBMAC1 support has been added to PKCS #12 (RFC 9579).
      * Experimental support for X25519Kyber768Draft00 hybrid post-quantum key agreement has been added (`draft-tls-westerbaan-xyber768d00`). It will be removed in a future release.
      * `lib::pkix` is the default validator in RHEL 10.
      * RSA certificates with keys shorter than 2048 bits stop working in SSL servers, in accordance with the system-wide cryptographic policy.
      * Added support for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA), which is a post-quantum cryptography (PQC) standard.
      * Added hybrid support for SSL for the MLKEM1024 key encapsulation mechanism.

      The following known issue occurs in this version: Updating the NSS database password corrupts the ML-DSA seed. For more information, see link:https://issues.redhat.com/browse/RHEL-114443[RHEL-114443].
      Show
      .NSS rebased to 3.112 The NSS cryptographic toolkit packages have been rebased to upstream version 3.112, which provides many improvements and fixes. Most notably, the following: * DTLS 1.3 protocol is now supported (RFC 9147). * PBMAC1 support has been added to PKCS #12 (RFC 9579). * Experimental support for X25519Kyber768Draft00 hybrid post-quantum key agreement has been added (`draft-tls-westerbaan-xyber768d00`). It will be removed in a future release. * `lib::pkix` is the default validator in RHEL 10. * RSA certificates with keys shorter than 2048 bits stop working in SSL servers, in accordance with the system-wide cryptographic policy. * Added support for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA), which is a post-quantum cryptography (PQC) standard. * Added hybrid support for SSL for the MLKEM1024 key encapsulation mechanism. The following known issue occurs in this version: Updating the NSS database password corrupts the ML-DSA seed. For more information, see link: https://issues.redhat.com/browse/RHEL-114443 [ RHEL-114443 ].
    • Done
    • All
    • None

      We need to rebase NSS to 3.101 in RHEL-10, RHEL-9.2.0.z and later, and RHEL-8.8.0.z and later for the upcoming Firefox release

              rrelyea Robert Relyea
              rrelyea Robert Relyea
              Robert Relyea Robert Relyea
              Alexander Sosedkin Alexander Sosedkin
              Jan Fiala Jan Fiala
              Votes:
              0 Vote for this issue
              Watchers:
              9 Start watching this issue

                Created:
                Updated:
                Resolved: