This past weekend we found two bugs in NSPR. Bug 83845 affects code using NSPR's IPv6 socket interface on an IPv4 host. PR_GetPeerName method incorrectly returns the information of the local socket (as opposed to the peer) if invoked on a PR_AF_INET6 socket emulated on top of IPv4. This bug affects PSM. http://bugzilla.mozilla.org/show_bug.cgi?id=83845 Bug 83930 affects code using the NSPR private function PR_LockFile on Windows. http://bugzilla.mozilla.org/show_bug.cgi?id=83930 Fixes for these two bugs are in the bug reports. If you build NSPR from source, you should apply the patches. If you use our binary distributions, please feel free to ask me to help you determine whether your product is affected by these bugs. I plan to fix these bugs in NSPR 4.2, but will consider making a 4.1.2 patch release to deliver these bug fixes if necessary. Wan-Teh
