NSS 3.9.4 Release Notes
05 November 2004
Contents
Introduction
Network Security Services (NSS) 3.9.4 is a patch release for NSS 3.11. The bug fixes in NSS 3.9.4 are described in the "Bugs Fixed" section below.Distribution Information
The CVS tag for the NSS 3.9.4 release is NSS_3_9_4_RTM. NSS 3.9.4 requires NSPR 4.5.1.See the Documentation section for the build instructions.
NSS 3.9.4 source and binary distributions are also available on ftp.mozilla.org for secure HTTPS download:
- Source tarballs: https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_9_4_RTM/src/.
- Binary distributions: https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_9_4_RTM/. Both debug and optimized builds are provided. Go to the subdirectory for your platform, DBG (debug) or OPT (optimized), to get the tar.gz or zip file. The tar.gz or zip file expands to an nss-3.9.4 directory containing three subdirectories:
- include - NSS header files
- lib - NSS shared libraries
- bin - NSS Tools and test programs
Bugs Fixed
The following bugs have been fixed in NSS 3.9.4.- Bug 262192: SIGSEGV in pk11_forceTokenAttribute in softoken
- Bug 265373: compiler warnings in pki3hack on Solaris AMD64
- Bug 265504: cmsutil core dumps with invalid option set.
- Bug 265686: PK11_FindSlotByName(char *name) should be PK11_FindSlotByName(const char *name)
- Bug 265707: SECMOD_FindSlot always returns NULL
- Bug 265708: count should be CK_ULONG in SECMOD_UpdateSlotList
- Bug 266206: NSS initialization hangs if file descriptors are unlimited (MAX_INT)