diff options
Diffstat (limited to 'files/pt-br/mozilla/projects/nss/nss_3.16.4_release_notes/index.html')
-rw-r--r-- | files/pt-br/mozilla/projects/nss/nss_3.16.4_release_notes/index.html | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/files/pt-br/mozilla/projects/nss/nss_3.16.4_release_notes/index.html b/files/pt-br/mozilla/projects/nss/nss_3.16.4_release_notes/index.html new file mode 100644 index 0000000000..5873639121 --- /dev/null +++ b/files/pt-br/mozilla/projects/nss/nss_3.16.4_release_notes/index.html @@ -0,0 +1,32 @@ +--- +title: NSS 3.16.4 release notes +slug: Mozilla/Projects/NSS/NSS_3.16.4_release_notes +translation_of: Mozilla/Projects/NSS/NSS_3.16.4_release_notes +--- +<h2 id="Introdrução">Introdrução</h2> +<p>Network Security Services (NSS) 3.16.4 is a patch release for NSS 3.16. The bug fixes in NSS 3.16.4 are described in the "Bugs Fixed" section below.</p> +<h2 id="Distribution_Information">Distribution Information</h2> +<p>The HG tag is NSS_3_16_4_RTM. NSS 3.16.4 requires NSPR 4.10.6 or newer.</p> +<p>NSS 3.16.4 source distributions are available on ftp.mozilla.org for secure HTTPS download:</p> +<ul> + <li>Source tarballs:<br> + <a href="https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_16_4_RTM/src/">https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_16_4_RTM/src/</a></li> +</ul> +<h2 id="New_in_NSS_3.16.4">New in NSS 3.16.4</h2> +<p>This release consists primarily of CA certificate changes as listed below, and includes a small number of bug fixes.</p> +<h2 id="Notable_Changes_in_NSS_3.16.4">Notable Changes in NSS 3.16.4</h2> +<ul> + <li>The following <strong>1024-bit</strong> root CA certificate was <strong>restored</strong> to allow more time to develop a better transition strategy for affected sites. It was removed in <a href="https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.16.3_release_notes">NSS 3.16.3</a>, but discussion in the mozilla.dev.security.policy forum led to the decision to keep this root included longer in order to give website administrators more time to update their web servers. + <ul> + <li>CN = GTE CyberTrust Global Root + <ul> + <li>SHA1 Fingerprint: 97:81:79:50:D8:1C:96:70:CC:34:D8:09:CF:79:44:31:36:7E:F4:74</li> + </ul> + </li> + </ul> + </li> + <li>In <a href="https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.16.3_release_notes">NSS 3.16.3</a>, the <strong>1024-bit </strong>"Entrust.net Secure Server Certification Authority" root CA certificate (SHA1 Fingerprint: 99:A6:9B:E6:1A:FE:88:6B:4D:2B:82:00:7C:B8:54:FC:31:7E:15:39) was removed. In NSS 3.16.4, a <strong>2048-bit </strong>intermediate CA certificate has been included, without explicit trust. The intention is to mitigate the effects of the previous removal of the 1024-bit Entrust.net root certificate, because many public Internet sites still use the "USERTrust Legacy Secure Server CA" intermediate certificate that is signed by the 1024-bit Entrust.net root certificate. The inclusion of the intermediate certificate is a temporary measure to allow those sites to function, by allowing them to find a trust path to another <strong>2048-bit</strong> root CA certificate. The temporarily included intermediate certificate expires November 1, 2015.</li> +</ul> +<h2 id="Bugs_fixed_in_NSS_3.16.4">Bugs fixed in NSS 3.16.4</h2> +<p>This Bugzilla query returns all the bugs fixed in NSS 3.16.4:</p> +<p><a href="https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&classification=Components&query_format=advanced&product=NSS&target_milestone=3.16.4">https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&classification=Components&query_format=advanced&product=NSS&target_milestone=3.16.4</a></p> |