This past weekend we found two bugs in NSPR.

Bug 83845 affects code using NSPR's IPv6 socket interface
on an IPv4 host.  PR_GetPeerName method incorrectly returns
the information of the local socket (as opposed to the peer)
if invoked on a PR_AF_INET6 socket emulated on top of IPv4.
This bug affects PSM.
http://bugzilla.mozilla.org/show_bug.cgi?id=83845

Bug 83930 affects code using the NSPR private function
PR_LockFile on Windows.
http://bugzilla.mozilla.org/show_bug.cgi?id=83930

Fixes for these two bugs are in the bug reports.  If you
build NSPR from source, you should apply the patches.
If you use our binary distributions, please feel free to
ask me to help you determine whether your product is
affected by these bugs.  I plan to fix these bugs in
NSPR 4.2, but will consider making a 4.1.2 patch release
to deliver these bug fixes if necessary.

Wan-Teh

Reply via email to