summaryrefslogtreecommitdiff
path: root/doc/rst/legacy/nss_releases/nss_3.14.1_release_notes/index.rst
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rst/legacy/nss_releases/nss_3.14.1_release_notes/index.rst')
-rw-r--r--doc/rst/legacy/nss_releases/nss_3.14.1_release_notes/index.rst12
1 files changed, 6 insertions, 6 deletions
diff --git a/doc/rst/legacy/nss_releases/nss_3.14.1_release_notes/index.rst b/doc/rst/legacy/nss_releases/nss_3.14.1_release_notes/index.rst
index fc56f5c5e..ccd86f58f 100644
--- a/doc/rst/legacy/nss_releases/nss_3.14.1_release_notes/index.rst
+++ b/doc/rst/legacy/nss_releases/nss_3.14.1_release_notes/index.rst
@@ -72,29 +72,29 @@ NSS 3.14.1 release notes
.. container::
- Windows CE support has been removed from the code base.
- - `Bug 812399 <https://bugzilla.mozilla.org/show_bug.cgi?id=812399>`__ - In NSS 3.14, a
+ - `Bug 812399 <https://bugzilla.mozilla.org/show_bug.cgi?id=812399>`__ - In NSS 3.14, a
regression caused `Bug 641052 <https://bugzilla.mozilla.org/show_bug.cgi?id=641052>`__ /
CVE-2011-3640 to be re-introduced under certain situations. This regression only affected
applications that initialize NSS via the NSS_NoDB_Init function. NSS 3.14.1 includes the
complete fix for this issue.
- - `Bug 357025 <https://bugzilla.mozilla.org/show_bug.cgi?id=357025>`__ - NSS 3.14 added support
+ - `Bug 357025 <https://bugzilla.mozilla.org/show_bug.cgi?id=357025>`__ - NSS 3.14 added support
for tokens that make use of CKA_ALWAYS_AUTHENTICATE. However, when authenticating with such
tokens, it was possible for an internal lock to be acquired twice, causing a hang. This hang
has been fixed in NSS 3.14.1.
- - `Bug 802429 <https://bugzilla.mozilla.org/show_bug.cgi?id=802429>`__ - In previous versions of
+ - `Bug 802429 <https://bugzilla.mozilla.org/show_bug.cgi?id=802429>`__ - In previous versions of
NSS, the "cipherOrder" slot configuration flag was not respected, causing the most recently
added slot that supported the requested PKCS#11 mechanism to be used instead. NSS now
correctly respects the supplied cipherOrder.
Applications which use multiple PKCS#11 modules, which do not indicate which tokens should be
used by default for particular algorithms, and which do make use of cipherOrder may now find
that cryptographic operations occur on a different PKCS#11 token.
- - `Bug 802429 <https://bugzilla.mozilla.org/show_bug.cgi?id=802429>`__ - The NSS softoken is now
+ - `Bug 802429 <https://bugzilla.mozilla.org/show_bug.cgi?id=802429>`__ - The NSS softoken is now
the default token for SHA-256 and SHA-512. In previous versions of NSS, these algorithms would
be handled by the most recently added PKCS#11 token that supported them.
- - `Bug 611451 <https://bugzilla.mozilla.org/show_bug.cgi?id=611451>`__ - When built with the
+ - `Bug 611451 <https://bugzilla.mozilla.org/show_bug.cgi?id=611451>`__ - When built with the
current version of Apple XCode on Mac OS X, the NSS shared libraries will now only export the
public NSS functions.
- - `Bug 810582 <https://bugzilla.mozilla.org/show_bug.cgi?id=810582>`__ - TLS False Start is now
+ - `Bug 810582 <https://bugzilla.mozilla.org/show_bug.cgi?id=810582>`__ - TLS False Start is now
only used with servers that negotiate a cipher suite that supports forward secrecy.
**Note**: The criteria for False Start may change again in future NSS releases.