Please note, this is a STATIC archive of website developer.mozilla.org from 03 Nov 2016, cach3.com does not collect or store any user information, there is no "phishing" involved.

NSS 3.17.1 release notes

This article needs a technical review. How you can help.

Introduction

Network Security Services (NSS) 3.17.1 is a patch release for NSS 3.17. The bug fixes in NSS 3.17.1 are described in the "Bugs Fixed" section below.

Distribution Information

The HG tag is NSS_3_17_1_RTM. NSS 3.17.1 requires NSPR 4.10.7 or newer.

NSS 3.17.1 source distributions are available on ftp.mozilla.org for secure HTTPS download:

Security Advisories

The following security-relevant bugs have been resolved in NSS 3.17.1. Users are encouraged to upgrade immediately.

New in NSS 3.17.1

This patch release adds new functionality and fixes a bug that caused NSS to accept forged RSA signatures.

A new symbol, _SGN_VerifyPKCS1DigestInfo is exported in this release. As with all exported NSS symbols that have a leading underscore '_', this is an internal symbol for NSS use only. Applications that use or depend on these symbols can and will break in future NSS releases.

New Functionality

  • TLS_FALLBACK_SCSV is a signaling cipher suite value that indicates a handshake is the result of TLS version fallback.

New Macros

  • in ssl.h
    • SSL_ENABLE_FALLBACK_SCSV - an SSL socket option that enables TLS_FALLBACK_SCSV. Off by default.
  • in sslerr.h
    • SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT - a new SSL error code.
  • in sslproto.h
    • TLS_FALLBACK_SCSV - a a signaling cipher suite value that indicates a handshake is the result of TLS version fallback.

Notable Changes in NSS 3.17.1

Bugs fixed in NSS 3.17.1

This Bugzilla query returns all the bugs fixed in NSS 3.17.1:
https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&classification=Components&query_format=advanced&product=NSS&target_milestone=3.17.1

Acknowledgements

The NSS development team would like to thank Antoine Delignat-Lavaud, security researcher at Inria Paris in team Prosecco, and the Advanced Threat Research team at Intel Security, who both independently discovered and reported this issue, for responsibly disclosing the issue by providing advance copies of their research.

Compatibility

NSS 3.17.1 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 3.17.1 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.

Feedback

Bugs discovered should be reported by filing a bug report with bugzilla.mozilla.org (product NSS).

Document Tags and Contributors

 Contributors to this page: kscarfone, kaie, Wtchang
 Last updated by: kscarfone,