NSS 220.127.116.11 release notes¶
Network Security Services (NSS) 18.104.22.168 is a patch release for NSS 3.19.2. The bug fixes in NSS 22.214.171.124 are described in the “Security Advisories” section below.
The HG tag is NSS_3_19_2_1_RTM. NSS 126.96.36.199 requires NSPR 4.10.10 or newer.
NSS 188.8.131.52 and NSPR 4.10.10 source distributions are available on ftp.mozilla.org for secure HTTPS download:
The following security-relevant bugs have been resolved in NSS 184.108.40.206. Users are encouraged to upgrade immediately.
Bug 1192028 (CVE-2015-7181) and Bug 1202868 (CVE-2015-7182): Several issues existed within the ASN.1 decoder used by NSS for handling streaming BER data. While the majority of NSS uses a separate, unaffected DER decoder, several public routines also accept BER data, and thus are affected. An attacker that successfully exploited these issues can overflow the heap and may be able to obtain remote code execution.
Bug 1205157 (NSPR, CVE-2015-7183): A logic bug in the handling of large allocations would allow exceptionally large allocations to be reported as successful, without actually allocating the requested memory. This may allow attackers to bypass security checks and obtain control of arbitrary memory.
NSS 220.127.116.11 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 18.104.22.168 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.