The NSS Development Team announces the release of NSS 3.22.2,
which is a security patch release for NSS 3.22.
No new functionality is introduced in this release.
The following security-relevant bug has been resolved in NSS 3.22.2.
Users are encouraged to upgrade immediately.
* Bug 1245528 (CVE-
The NSS Development Team announces the release of NSS 3.21.1,
which is a security patch release for NSS 3.21.
No new functionality is introduced in this release.
The following security-relevant bug has been resolved in NSS 3.21.1.
Users are encouraged to upgrade immediately.
* Bug 1245528 (CVE-
The NSS team has released Network Security Services (NSS) 3.23, which is a minor
release.
The following security-relevant bug has been resolved in NSS 3.23.
Users are encouraged to upgrade immediately.
* Bug 1245528 (CVE-2016-1950):
Fixed a heap-based buffer overflow related to the parsing of
The NSS Development Team announces the release of NSS 3.19.2.3,
which is a security patch release for NSS 3.19.2.
(Current users of NSS 3.19.3, NSS 3.19.4 or NSS 3.20.x are advised to update to
NSS 3.21.1, NSS 3.22.2, or a later release.)
No new functionality is introduced in this release.
The f
On Tue, 2016-03-08 at 18:22 +0530, varun naganathan wrote:
> I'm currently working to migrate the storage of certs to a hash table
> rather than a linked list which provides lookups at O(1) rather than
> the present lookup of O(n).
>
> The details of this behavior can be found in
> https://bugzilla
Hi all,
I've currently been working on optimizing the nss package functions
like NSSTrustDomain_TraverseCertificates()
which can be seen at
https://dxr.mozilla.org/mozilla-central/source/security/nss/lib/pki/trustdomain.c?from=NSSTrustDomain_TraverseCertificates#988
and nssPKIObjectCollection_AddIn
6 matches
Mail list logo