The NSS team has released Network Security Services (NSS) 3.58 on 16 October 
2020, which is a minor release.

The NSS team would like to recognize first-time contributors:

* Ricky Stewart


The HG tag is NSS_3_58_RTM. NSS 3.58 requires NSPR 4.29 or newer.

NSS 3.58 source distributions are available on ftp.mozilla.org for secure HTTPS 
download: 
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_58_RTM/src/


Bugs fixed in NSS 3.58

* Bug 1641480 (CVE-2020-25648) - Tighten CCS handling for middlebox 
compatibility mode.
* Bug 1631890 - Add support for Hybrid Public Key Encryption 
(draft-irtf-cfrg-hpke) support for TLS Encrypted Client Hello 
(draft-ietf-tls-esni).
* Bug 1657255 - Add CI tests that disable SHA1/SHA2 ARM crypto extensions.
* Bug 1668328 - Handle spaces in the Python path name when using gyp on Windows.
* Bug 1667153 - Add PK11_ImportDataKey for data object import.
* Bug 1665715 - Pass the embedded SCT list extension (if present) to 
TrustDomain::CheckRevocation instead of the notBefore value.

This Bugzilla query returns all the bugs fixed in NSS 3.58:

https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&classification=Components&query_format=advanced&product=NSS&target_milestone=3.58


NSS 3.58 shared libraries are backward compatible with all older NSS 3.x shared 
libraries. A program linked with older NSS 3.x shared libraries will work with 
NSS 3.58 shared libraries without recompiling or relinking. Furthermore, 
applications that restrict their use of NSS APIs to the functions listed in NSS 
Public Functions will remain compatible with future versions of the NSS shared 
libraries.


Bugs discovered should be reported by filing a bug report with 
bugzilla.mozilla.org (product NSS).

Please refer to the release notes for the complete list of changes:
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.58_release_notes
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to