summaryrefslogtreecommitdiff
path: root/doc/rst/legacy/nss_releases/nss_3.19.2.3_release_notes/index.rst
blob: 6362f733ae808978b2a1b93cc1512e28bbd22e28 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
.. _mozilla_projects_nss_nss_3_19_2_3_release_notes:

NSS 3.19.2.3 release notes
==========================

`Introduction <#introduction>`__
--------------------------------

.. container::

   Network Security Services (NSS) 3.19.2.3 is a security patch release for NSS 3.19.2. The bug
   fixes in NSS 3.19.2.3 are described in the "Security Fixes" section below.

   (Current users of NSS 3.19.3, NSS 3.19.4 or NSS 3.20.x are advised to update to
   :ref:`mozilla_projects_nss_nss_3_21_1_release_notes`,
   :ref:`mozilla_projects_nss_nss_3_22_2_release_notes`, or a later release.)

.. _distribution_information:

`Distribution Information <#distribution_information>`__
--------------------------------------------------------

.. container::

   The HG tag is NSS_3_19_2_3_RTM. NSS 3.19.2.3 requires NSPR 4.10.10 or newer.

   NSS 3.19.2.3 source distributions are available on ftp.mozilla.org for secure HTTPS download:

   -  Source tarballs:
      https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_19_2_3_RTM/src/

.. _new_in_nss_3.19.2.3:

`New in NSS 3.19.2.3 <#new_in_nss_3.19.2.3>`__
----------------------------------------------

.. container::

.. _new_functionality:

`New Functionality <#new_functionality>`__
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

.. container::

   No new functionality is introduced in this release.

.. _security_fixes_in_nss_3.19.2.3:

`Security Fixes in NSS 3.19.2.3 <#security_fixes_in_nss_3.19.2.3>`__
--------------------------------------------------------------------

.. container::

   -  `Bug 1245528 <https://bugzilla.mozilla.org/show_bug.cgi?id=1245528>`__ /
      `CVE-2016-1950 <http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950>`__ - Fixed a
      heap-based buffer overflow related to the parsing of certain ASN.1 structures. An attacker
      could create a specially-crafted certificate which, when parsed by NSS, would cause a crash or
      execution of arbitrary code with the permissions of the user.

`Acknowledgements <#acknowledgements>`__
----------------------------------------

.. container::

   The NSS development team would like to thank security researcher Francis Gabriel for responsibly
   disclosing the issue in `Bug 1245528 <https://bugzilla.mozilla.org/show_bug.cgi?id=1245528>`__.

`Compatibility <#compatibility>`__
----------------------------------

.. container::

   NSS 3.19.2.3 shared libraries are backward compatible with all older NSS 3.x shared libraries. A
   program linked with older NSS 3.x shared libraries will work with NSS 3.19.2.3 shared libraries
   without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs
   to the functions listed in NSS Public Functions will remain compatible with future versions of
   the NSS shared libraries.

`Feedback <#feedback>`__
------------------------

.. container::

   Bugs discovered should be reported by filing a bug report with
   `bugzilla.mozilla.org <https://bugzilla.mozilla.org/enter_bug.cgi?product=NSS>`__ (product NSS).