RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1200900 - Rebase nss to 3.18 for Firefox 38 ESR [RHEL-6.6]
Summary: Rebase nss to 3.18 for Firefox 38 ESR [RHEL-6.6]
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: nss
Version: 6.6
Hardware: Unspecified
OS: Unspecified
high
unspecified
Target Milestone: rc
: ---
Assignee: Elio Maldonado Batiz
QA Contact: BaseOS QE Security Team
URL:
Whiteboard: [ important information: COMMENT 11 ]
: 1200939 (view as bug list)
Depends On: 1200920 1200937 1200938
Blocks: 1200499 1207052
TreeView+ depends on / blocked
 
Reported: 2015-03-11 15:34 UTC by Elio Maldonado Batiz
Modified: 2015-10-02 23:07 UTC (History)
5 users (show)

Fixed In Version: nss-3.18.0-5.3.el6
Doc Type: Rebase: Bug Fixes and Enhancements
Doc Text:
The nss and nss-util packages have been upgraded to upstream versions 3.18, and the nspr packages have been upgraded to upstream version 4.10.8. The upgraded versions provide a number of bug fixes and enhancements over the previous versions. Notably, these upgrades allow users to upgrade to Mozilla Firefox 38 Extended Support Release.
Clone Of:
: 1207052 (view as bug list)
Environment:
Last Closed: 2015-10-02 23:07:52 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
Patch to keep 1024 bit legacy CA certificates enabled in the NSS root CA module (117.31 KB, patch)
2015-03-25 17:31 UTC, Kai Engert (:kaie) (inactive account)
no flags Details | Diff
All changes for rebasing plus two bug fixes (163.02 KB, patch)
2015-03-31 21:48 UTC, Elio Maldonado Batiz
no flags Details | Diff

Description Elio Maldonado Batiz 2015-03-11 15:34:01 UTC
Firefox 38 ESR, current upstream release date is May 12 2015, requires nss-3.18.

Comment 2 Kai Engert (:kaie) (inactive account) 2015-03-11 17:10:23 UTC
*** Bug 1200939 has been marked as a duplicate of this bug. ***

Comment 4 Kai Engert (:kaie) (inactive account) 2015-03-25 17:31:13 UTC
Created attachment 1006380 [details]
Patch to keep 1024 bit legacy CA certificates enabled in the NSS root CA module

I suggest to include this patch in the NSS 3.18 package.

It keeps the trust flags of legacy root CA certificates enabled, as they were before Mozilla decided to phase them out in Firefox.

This patch has the certificates that were changed in the upstream releases version 2.1, 2.2 and 2.3

See also this page which documents the changes:
https://fedoraproject.org/wiki/CA-Certificates


This patch will affect users who are still using the default configuration of RHEL 6, which DOESN'T yet use the shared system certificate store.


If users of RHEL 6.5 and later would like to disable the legacy CAs, they can:

- migrate their system to the new shared CA store by executing:
  update-ca-trust enable

- disable the legacy root CAs:
  ca-legacy disable

(The ca-legacy command will be introduced in version 2.3 of the ca-certificates pacakge.)

Comment 6 Elio Maldonado Batiz 2015-03-31 21:48:18 UTC
Created attachment 1009282 [details]
All changes for rebasing plus two bug fixes

This is actually for rhel-6.6.z, attaching it here because the clone of this bug hasn't be filed yet. Includes fixes for Bug 1123092 and Bug 1131311.

Comment 7 Elio Maldonado Batiz 2015-03-31 21:50:24 UTC
My mistake, the clone is filed. I'll attach it there.


Note You need to log in before you can comment on or make changes to this bug.