This article needs a technical review. How you can help.
Introduction
Network Security Services (NSS) 3.17.4 is a patch release for NSS 3.17. The bug fixes in NSS 3.17.4 are described in the "Bugs Fixed" section below.
Distribution Information
The HG tag is NSS_3_17_4_RTM. NSS 3.17.4 requires NSPR 4.10.7 or newer.
NSS 3.17.4 source distributions are available on ftp.mozilla.org for secure HTTPS download:
New in NSS 3.17.4
New Functionality
No new functionality is introduced in this release. This is a patch release to fix multiple bugs.
Notable Changes in NSS 3.17.4
- Bug 1084986: If an SSL/TLS connection fails, because client and server don't have any common protocol version enabled, NSS has been changed to report error code SSL_ERROR_UNSUPPORTED_VERSION (instead of reporting SSL_ERROR_NO_CYPHER_OVERLAP).
- Bug 1112461: libpkix was fixed to prefer the newest certificate, if multiple certificates match.
- Bug 1094492: fixed a memory corruption issue during failure of keypair generation.
- Bug 1113632: fixed a failure to reload a PKCS#11 module in FIPS mode.
- Bug 1119983: fixed interoperability of NSS server code with a LibreSSL client.
Bugs fixed in NSS 3.17.4
This Bugzilla query returns all the bugs fixed in NSS 3.17.4:
Compatibility
NSS 3.17.4 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 3.17.4 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.
Feedback
Bugs discovered should be reported by filing a bug report with bugzilla.mozilla.org (product NSS).