Dear all,

Network Security Services (NSS) 3.78.1 was released on 31st May 2022.

This release fixes memory safety violations that can occur when parsing CMS
data. We presume that with enough effort these memory safety violations are
exploitable.

The HG tag is NSS_3_78_1_RTM. This version of NSS requires NSPR 4.32 or
newer.

NSS 3.78.4 source distributions are available on ftp.mozilla.org for secure
HTTPS download: <
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_78_1_RTM/src/
>

Change:
     - Bug 1767590 - Initialize pointers passed to
NSS_CMSDigestContext_FinishMultiple.

NSS 3.78.1 shared libraries are backwards-compatible with all older NSS 3.x
shared libraries. A program linked with older NSS 3.x shared libraries will
work with this new version of the shared libraries without recompiling or
relinking. Furthermore, applications that restrict their use of NSS APIs to
the functions listed in NSS Public Functions will remain compatible with
future versions of the NSS shared libraries.

Bugs discovered should be reported by filing a bug report at <
https://bugzilla.mozilla.org/enter_bug.cgi?product=NSS>

Release notes will be available at <
https://firefox-source-docs.mozilla.org/security/nss/releases/index.html>
though you should expect a small delay.

Best,
Dennis

-- 
You received this message because you are subscribed to the Google Groups 
"dev-tech-crypto@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-tech-crypto+unsubscr...@mozilla.org.
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-tech-crypto/CAON8YFO0j%3DfQvvmLwwOYH%3DGAdCije6WrLZ3h-e2COF%3DpZ0_F4g%40mail.gmail.com.

Reply via email to