Network Security Services (NSS) 3.26.2 is a patch release for NSS 3.26.
The HG tag is NSS_3_26_2_RTM. NSS 3.26.2 requires NSPR 4.12 or newer.
NSS 3.26.2 source distributions are available on ftp.mozilla.org for secure HTTPS download:
New in NSS 3.26.2
No new functionality is introduced in this release. This is a patch release to address a TLS compatibility issue that some client applications experienced with NSS 3.26.1.
Notable Changes in NSS 3.26.2
MD5 signature algorithms sent by the server in CertificateRequest messages are now properly ignored. Previously, with rare server configurations, an MD5 signature algorithm might have been selected for client authentication and caused the client to abort the connection soon after.
Bugs fixed in NSS 3.26.2
- The following bug has been fixed in NSS 3.26.2: Ignore MD5 signature algorithms in certificate requests
NSS 3.26.2 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 3.26.2 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.
Bugs discovered should be reported by filing a bug report with bugzilla.mozilla.org (product NSS).