This article needs a technical review. How you can help.
Network Security Services (NSS) 22.214.171.124 is a security patch release for NSS 3.19.2. The bug fixes in NSS 126.96.36.199 are described in the "Security Fixes" section below.
The HG tag is NSS_3_19_2_3_RTM. NSS 188.8.131.52 requires NSPR 4.10.10 or newer.
NSS 184.108.40.206 source distributions are available on ftp.mozilla.org for secure HTTPS download:
- Source tarballs:
New in NSS 220.127.116.11
No new functionality is introduced in this release.
Security Fixes in NSS 18.104.22.168
- Bug 1245528 / CVE-2016-1950 - Fixed a heap-based buffer overflow related to the parsing of certain ASN.1 structures. An attacker could create a specially-crafted certificate which, when parsed by NSS, would cause a crash or execution of arbitrary code with the permissions of the user.
The NSS development team would like to thank security researcher Francis Gabriel for responsibly disclosing the issue in Bug 1245528.
NSS 22.214.171.124 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 126.96.36.199 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.
Bugs discovered should be reported by filing a bug report with bugzilla.mozilla.org (product NSS).