Network Security Services (NSS) 3.12.5 is a patch release for NSS 3.12. The bug fixes in NSS 3.12.5 are described in the "Bugs Fixed" section below.
NSS 3.12.5 is tri-licensed under the MPL 1.1/GPL 2.0/LGPL 2.1.
The CVS tag for the NSS 3.12.5 release is NSS_3_12_5_RTM
.
NSS 3.12.5 requires NSPR 4.8.
You can check out the source from CVS by
See the Documentation section for the build instructions.
NSS 3.12.5 source is also available on ftp.mozilla.org
for secure HTTPS download:
See CVE-2009-3555 and US-CERT VU#120541 for more information about this security vulnerability.
All SSL/TLS renegotiation is disabled by default in NSS 3.12.5. This will cause programs that attempt to perform renegotiation to experience failures where they formerly experienced successes, and is necessary for them to not be vulnerable, until such time as a new safe renegotiation scheme is standardized by the IETF.
If an application depends on renegotiation feature, it can be enabled by setting the environment variable NSS_SSL_ENABLE_RENEGOTIATION to 1. By setting this environmental variable, the fix provided by these patches will have no effect and the application may become vulnerable to the issue.
This default setting can also be changed within the application by using the following existing API functions:
Parameters for these functions are used to initialize softoken. These are mostly strings used to internationalize softoken. Memory for the strings are owned by the caller, who is free to free them once NSS_ContextInit returns. If the string parameter is NULL (as opposed to empty, zero length), then the softoken default is used. These are equivalent to the parameters for PK11_ConfigurePKCS11().
See the following struct in nss.h for details:The following bugs have been fixed in NSS 3.12.5.
For a list of the primary NSS documentation pages on mozilla.org, see NSS Documentation. New and revised documents available since the release of NSS 3.11 include the following:
NSS 3.12.5 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 3.12.5 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.
Bugs discovered should be reported by filing a bug report with mozilla.org Bugzilla (product NSS).
This document was generated by genma teruaki on November 28, 2010 using texi2html 1.82.