diff options
author | ryoon <ryoon> | 2015-05-29 14:19:25 +0000 |
---|---|---|
committer | ryoon <ryoon> | 2015-05-29 14:19:25 +0000 |
commit | 8ec74f45b7a6786634e25cd85c37898dba47860e (patch) | |
tree | 98ec24c4c3b49046bc9c20a1aa59ed6dfd0efd53 /misc/ruby-hashie | |
parent | c3625bd9c22562bac325bbe8640df88ab4a178fe (diff) | |
download | pkgsrc-8ec74f45b7a6786634e25cd85c37898dba47860e.tar.gz |
Update to 3.19.1
Changelog:
Network Security Services (NSS) 3.19.1 is a patch release
for NSS 3.19.
No new functionality is introduced in this release. This patch
release includes a fix for the recently published logjam attack.
Notable Changes:
* The minimum strength of keys that libssl will accept for
finite field algorithms (RSA, Diffie-Hellman, and DSA) have
been increased to 1023 bits (bug 1138554).
* NSS reports the bit length of keys more accurately. Thus,
the SECKEY_PublicKeyStrength and SECKEY_PublicKeyStrengthInBits
functions could report smaller values for values that have
leading zero values. This affects the key strength values that
are reported by SSL_GetChannelInfo.
The NSS development team would like to thank Matthew Green and
Karthikeyan Bhargavan for responsibly disclosing the issue in
bug 1138554.
The HG tag is NSS_3_19_1_RTM. NSS 3.19.1 requires NSPR 4.10.8 or newer.
Diffstat (limited to 'misc/ruby-hashie')
0 files changed, 0 insertions, 0 deletions