FEDORA-2015-9130

security update in Fedora 21 for nss, nss-softokn, & 1 more

Status: stable 4 years ago

Security fix for CVE-2015-4000

Update to the upstream NSS 3.19.1 release, which includes a fix for the recently published logjam attack.

The previous 3.19 release made several notable changes related to the TLS protocol, one of them was to disable the SSL 3 protocol by default.

For the full list of changes in the 3.19 and 3.19.1 releases, please refer to the upstream release notes documents:

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.1_release_notes

https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19_release_notes

Comments 17

This update has been submitted for testing by kengert.

Taskotron: depcheck test PASSED on i386. Result log: https://taskotron.fedoraproject.org/taskmaster//builders/x86_64/builds/74500/steps/runtask/logs/stdio (results are informative only)

Taskotron: depcheck test PASSED on x86_64. Result log: https://taskotron.fedoraproject.org/taskmaster//builders/x86_64/builds/74500/steps/runtask/logs/stdio (results are informative only)

This update is currently being pushed to the Fedora 21 testing updates repository.

Working fine for me as used by dependant applications.

karma: +1

This update has been pushed to testing

works for me

karma: +1

Critical path update approved

This update has reached the stable karma threshold and will be pushed to the stable updates repository

Taskotron: upgradepath test FAILED on noarch. Result log: https://taskotron.fedoraproject.org/taskmaster//builders/x86_64/builds/75018/steps/runtask/logs/stdio (results are informative only)

Automatic push to stable based on karma has been disabled for this update due to failure of an AutoQA test. Update submitter, please check the AutoQA test result and see if there is a valid problem to be fixed here, and fix it if so. If the failure is a mistake on AutoQA's part, you can re-enable the automatic push feature for this update if you like, or push it stable manually once it reaches the requirements under the Updates Policy.

This update is currently being pushed to the Fedora 21 stable updates repository.

https://weakdh.org/ still reports my browser is vulnerable. Is the fix really in place?

karma: -1

@jvcelak: https://weakdh.org/ reports my browser is safe with the equivalent fc22 update. Are you sure you're not using an older version of this package that's still cached in memory?

@dhgutteridge Sorry, I restarted my browser, but probably incorrectly. The problem disappeared after full reboot.

karma: +1

This update has been pushed to stable

Add Comment & Feedback

Please login to add feedback.

Content Type
RPM
Status
stable
Test Gating
Submitted by
Update Type
security
Update Severity
unspecified
Karma
+4
stable threshold: 3
unstable threshold: -3
Autopush (karma)
Disabled
Autopush (time)
Disabled
Dates
submitted 4 years ago
in testing 4 years ago
in stable 4 years ago
modified 4 years ago

Related Bugs 3

00 #1214732 nss-3.19.1 is available
00 #1223211 CVE-2015-4000 LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks
00 #1224448 CVE-2015-4000 nss: LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks [fedora-all]

Automated Test Results