aboutsummaryrefslogtreecommitdiff
path: root/files/pt-br/mozilla/projects/nss/nss_3.16.4_release_notes/index.html
diff options
context:
space:
mode:
Diffstat (limited to 'files/pt-br/mozilla/projects/nss/nss_3.16.4_release_notes/index.html')
-rw-r--r--files/pt-br/mozilla/projects/nss/nss_3.16.4_release_notes/index.html32
1 files changed, 32 insertions, 0 deletions
diff --git a/files/pt-br/mozilla/projects/nss/nss_3.16.4_release_notes/index.html b/files/pt-br/mozilla/projects/nss/nss_3.16.4_release_notes/index.html
new file mode 100644
index 0000000000..5873639121
--- /dev/null
+++ b/files/pt-br/mozilla/projects/nss/nss_3.16.4_release_notes/index.html
@@ -0,0 +1,32 @@
+---
+title: NSS 3.16.4 release notes
+slug: Mozilla/Projects/NSS/NSS_3.16.4_release_notes
+translation_of: Mozilla/Projects/NSS/NSS_3.16.4_release_notes
+---
+<h2 id="Introdrução">Introdrução</h2>
+<p>Network Security Services (NSS) 3.16.4 is a patch release for NSS 3.16. The bug fixes in NSS 3.16.4 are described in the "Bugs Fixed" section below.</p>
+<h2 id="Distribution_Information">Distribution Information</h2>
+<p>The HG tag is NSS_3_16_4_RTM. NSS 3.16.4 requires NSPR 4.10.6 or newer.</p>
+<p>NSS 3.16.4 source distributions are available on ftp.mozilla.org for secure HTTPS download:</p>
+<ul>
+ <li>Source tarballs:<br>
+ <a href="https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_16_4_RTM/src/">https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_16_4_RTM/src/</a></li>
+</ul>
+<h2 id="New_in_NSS_3.16.4">New in NSS 3.16.4</h2>
+<p>This release consists primarily of CA certificate changes as listed below, and includes a small number of bug fixes.</p>
+<h2 id="Notable_Changes_in_NSS_3.16.4">Notable Changes in NSS 3.16.4</h2>
+<ul>
+ <li>The following <strong>1024-bit</strong> root CA certificate was <strong>restored</strong> to allow more time to develop a better transition strategy for affected sites. It was removed in <a href="https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.16.3_release_notes">NSS 3.16.3</a>, but discussion in the mozilla.dev.security.policy forum led to the decision to keep this root included longer in order to give website administrators more time to update their web servers.
+ <ul>
+ <li>CN = GTE CyberTrust Global Root
+ <ul>
+ <li>SHA1 Fingerprint: 97:81:79:50:D8:1C:96:70:CC:34:D8:09:CF:79:44:31:36:7E:F4:74</li>
+ </ul>
+ </li>
+ </ul>
+ </li>
+ <li>In <a href="https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.16.3_release_notes">NSS 3.16.3</a>, the <strong>1024-bit </strong>"Entrust.net Secure Server Certification Authority" root CA certificate (SHA1 Fingerprint: 99:A6:9B:E6:1A:FE:88:6B:4D:2B:82:00:7C:B8:54:FC:31:7E:15:39) was removed. In NSS 3.16.4, a <strong>2048-bit </strong>intermediate CA certificate has been included, without explicit trust. The intention is to mitigate the effects of the previous removal of the 1024-bit Entrust.net root certificate, because many public Internet sites still use the "USERTrust Legacy Secure Server CA" intermediate certificate that is signed by the 1024-bit Entrust.net root certificate. The inclusion of the intermediate certificate is a temporary measure to allow those sites to function, by allowing them to find a trust path to another <strong>2048-bit</strong> root CA certificate. The temporarily included intermediate certificate expires November 1, 2015.</li>
+</ul>
+<h2 id="Bugs_fixed_in_NSS_3.16.4">Bugs fixed in NSS 3.16.4</h2>
+<p>This Bugzilla query returns all the bugs fixed in NSS 3.16.4:</p>
+<p><a href="https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&amp;classification=Components&amp;query_format=advanced&amp;product=NSS&amp;target_milestone=3.16.4">https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&amp;classification=Components&amp;query_format=advanced&amp;product=NSS&amp;target_milestone=3.16.4</a></p>