The NSS team has released Network Security Services (NSS) 3.15.2, which is
a minor release.

The HG tag is NSS_3_15_2_RTM. NSS 3.15.2 requires NSPR 4.10 or newer.

Detailed release notes are available at
https://developer.mozilla.org/en-US/docs/NSS/NSS_3.15.2_release_notes and
reproduced below.

This release includes security-relevant fixes (CVE-2013-1739).


Introduction

Network Security Services (NSS) 3.15.2 is a patch release for NSS 3.15.
The bug fixes in NSS 3.15.2 are described in the "Bugs Fixed" section
below.

Distribution Information

NSS 3.15.2 source distributions are also available on ftp.mozilla.org for
secure HTTPS download:
* Source tarballs:
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_15_2_RTM/src/


Security Advisories

The following security-relevant bugs have been resolved in NSS 3.15.2.
Users are encouraged to upgrade immediately.
* Bug 894370 - (CVE-2013-1739) Avoid uninitialized data read in the event
of a decryption failure.

New in NSS 3.15.2

New Functionality
* AES-GCM Ciphersuites: AES-GCM cipher suite (RFC 5288 and RFC 5289)
support has been added when TLS 1.2 is negotiated. Specifically, the
following cipher suites are now supported:
  - TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  - TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
  - TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
  - TLS_RSA_WITH_AES_128_GCM_SHA256

New Functions
* PK11_CipherFinal has been introduced, which is a simple alias for
PK11_DigestFinal.

New Types
* No new types have been introduced.

New PKCS #11 Mechanisms
* No new PKCS#11 mechanisms have been introduced

Notable Changes in NSS 3.15.2
* Bug 880543 - Support for AES-GCM ciphersuites that use the SHA-256 PRF
* Bug 663313 - MD2, MD4, and MD5 signatures are no longer accepted for
OCSP or CRLs, consistent with their handling for general certificate
signatures.
* Bug 884178 - Add PK11_CipherFinal macro

Bugs fixed in NSS 3.15.2
* Bug 734007 - sizeof() used incorrectly
* Bug 900971 - nssutil_ReadSecmodDB() leaks memory
* Bug 681839 - Allow SSL_HandshakeNegotiatedExtension to be called before
the handshake is finished.
* Bug 848384 - Deprecate the SSL cipher policy code, as it's no longer
relevant. It is no longer necessary to call NSS_SetDomesticPolicy because
all cipher suites are now allowed by default.

A complete list of all bugs resolved in this release can be obtained at
https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&classification=Components&query_format=advanced&target_milestone=3.15.2&product=NSS&list_id=7982238

Compatibility

NSS 3.15.2 shared libraries are backward compatible with all older NSS 3.x
shared libraries. A program linked with older NSS 3.x shared libraries
will work with NSS 3.15.2 shared libraries without recompiling or
relinking. Furthermore, applications that restrict their use of NSS APIs
to the functions listed in NSS Public Functions will remain compatible
with future versions of the NSS shared libraries.

Feedback

Bugs discovered should be reported by filing a bug report with
bugzilla.mozilla.org (product NSS).

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to