Dear all,

Network Security Services (NSS) 3.68.3 was released on 28 March 2022.

This release improves the stability of NSS when used in a multi-threaded
environment. In particular, it fixes memory safety violations that can
occur when PKCS#11 tokens are removed while in use (CVE-2022-1097). We
presume that with enough effort these memory safety violations are
exploitable.

The HG tag is NSS_3_68_3_RTM. This version of NSS requires NSPR 4.32 or
newer.

NSS 3.68.3 source distributions are available on ftp.mozilla.org for secure
HTTPS download: <
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_68_3_RTM/src/
>

Change:
   - Bug 1756271 - Remove token member from NSSSlot struct.
   - Bug 1755555 - Hold tokensLock through nssToken_GetSlot calls in
nssTrustDomain_GetActiveSlots.
   - Bug 1370866 - Check return value of PK11Slot_GetNSSToken.

NSS 3.68.3 shared libraries are backwards-compatible with all older NSS 3.x
shared libraries. A program linked with older NSS 3.x shared libraries will
work with this new version of the shared libraries without recompiling or
relinking. Furthermore, applications that restrict their use of NSS APIs to
the functions listed in NSS Public Functions will remain compatible with
future versions of the NSS shared libraries.

Bugs discovered should be reported by filing a bug report at <
https://bugzilla.mozilla.org/enter_bug.cgi?product=NSS>

Release notes will be available at <
https://firefox-source-docs.mozilla.org/security/nss/releases/index.html>
though you should expect a small delay.

Best,
John

-- 
You received this message because you are subscribed to the Google Groups 
"dev-tech-crypto@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-tech-crypto+unsubscr...@mozilla.org.
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-tech-crypto/CAFgAd7HPSFh73SXApa5eA0%3DM8oAea3oJ3SgeW0iEdZ%2B6JYQqhg%40mail.gmail.com.

Reply via email to