391ea6
diff -up firefox-84.0.2/security/certverifier/NSSCertDBTrustDomain.cpp.nss-hack firefox-84.0.2/security/certverifier/NSSCertDBTrustDomain.cpp
391ea6
--- firefox-84.0.2/security/certverifier/NSSCertDBTrustDomain.cpp.nss-hack      2021-01-11 12:12:02.585514543 +0100
391ea6
+++ firefox-84.0.2/security/certverifier/NSSCertDBTrustDomain.cpp       2021-01-11 12:47:50.345984582 +0100
391ea6
@@ -1619,6 +1619,15 @@ SECStatus InitializeNSS(const nsACString
391ea6
     return srv;
391ea6
   }
391ea6

391ea6
+  /* Sets the NSS_USE_ALG_IN_ANY_SIGNATURE bit.
391ea6
+   * does not change NSS_USE_ALG_IN_CERT_SIGNATURE,
391ea6
+   * so policy will still disable use of sha1 in
391ea6
+   * certificate related signature processing. */
391ea6
+  srv = NSS_SetAlgorithmPolicy(SEC_OID_SHA1, NSS_USE_ALG_IN_ANY_SIGNATURE, 0);
391ea6
+  if (srv != SECSuccess) {
391ea6
+    NS_WARNING("Unable to use SHA1 for Add-ons, expect broken/disabled Add-ons. See https://bugzilla.redhat.com/show_bug.cgi?id=1908018 for details.");
391ea6
+  }
391ea6
+
391ea6
   if (nssDbConfig == NSSDBConfig::ReadWrite) {
391ea6
     UniquePK11SlotInfo slot(PK11_GetInternalKeySlot());
391ea6
     if (!slot) {