The NSS team has released Network Security Services (NSS) 3.60 on 11 December 
2020, which is a minor release.

The NSS team would like to recognize first-time contributors:

* yogesh

The HG tag is NSS_3_60_RTM. NSS 3.60 requires NSPR 4.29 or newer.

NSS 3.60 source distributions are available on ftp.mozilla.org for secure HTTPS 
download: 
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_60_RTM/src/

Notable changes in NSS 3.60: 
* TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support has been 
added, replacing the previous ESNI (draft-ietf-tls-esni-01) implementation. See 
bug 1654332 for more information. 
* December 2020 batch of Root CA changes, builtins library updated to version 
2.46. See bugs 1678189, 1678166, and 1670769 for more information.

Bugs fixed in NSS 3.60:
 * Bug 1654332 - Implement Encrypted Client Hello (draft-ietf-tls-esni-08).
 * Bug 1678189 - Update CA list version to 2.46.
 * Bug 1670769 - Remove 10 GeoTrust, thawte, and VeriSign root certs from NSS.
 * Bug 1678166 - Add NAVER Global Root Certification Authority root cert to NSS.
 * Bug 1678384 - Add a build flag to allow building nssckbi-testlib in 
mozilla-central.
 * Bug 1570539 - Remove -X alt-server-hello option from tstclnt.
 * Bug 1675523 - Fix incorrect pkcs11t.h value CKR_PUBLIC_KEY_INVALID.
 * Bug 1642174 - Fix PowerPC ABI version 1 build failure.
 * Bug 1674819 - Fix undefined shift in fuzzer mode.
 * Bug 1678990 - Fix ARM crypto extensions detection on macOS.
 * Bug 1679290 - Fix lock order inversion and potential deadlock with libnsspem.
 * Bug 1680400 - Fix memory leak in PK11_UnwrapPrivKey.

This Bugzilla query returns all the bugs fixed in NSS 3.60:

https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&classification=Components&query_format=advanced&product=NSS&target_milestone=3.60

NSS 3.60 shared libraries are backward compatible with all older NSS 3.x shared 
libraries. A program linked with older NSS 3.x shared libraries will work with 
NSS 3.60 shared libraries without recompiling or relinking. Furthermore, 
applications that restrict their use of NSS APIs to the functions listed in NSS 
Public Functions will remain compatible with future versions of the NSS shared 
libraries.

Bugs discovered should be reported by filing a bug report with 
bugzilla.mozilla.org (product NSS).

Please refer to the release notes for the complete list of changes:
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.60_release_notes
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to