NSS 3.74 Release

35 views
Skip to first unread message

Benjamin Beurdouche

unread,
Jan 6, 2022, 7:37:22 AMJan 6
to dev-tec...@mozilla.org
Dear all,

Network Security Services (NSS) 3.74 was released on 06 January 2022.

The HG tag is NSS_3_74_RTM. This version of NSS requires NSPR 4.32 or newer.

NSS 3.74 source distributions are available on ftp.mozilla.org for secure HTTPS download: <https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_74_RTM/src/>

Changes:
• Bug 966856 - mozilla::pkix: support SHA-2 hashes in CertIDs in OCSP responses.
• Bug 1553612 - Ensure clients offer consistent ciphersuites after HRR.
• Bug 1721426 - NSS does not properly restrict server keys based on policy.
• Bug 1733003 - Set nssckbi version number to 2.54.
• Bug 1735407 - Replace Google Trust Services LLC (GTS) R4 root certificate in NSS.
• Bug 1735407 - Replace Google Trust Services LLC (GTS) R3 root certificate in NSS.
• Bug 1735407 - Replace Google Trust Services LLC (GTS) R2 root certificate in NSS.
• Bug 1735407 - Replace Google Trust Services LLC (GTS) R1 root certificate in NSS.
• Bug 1735407 - Replace GlobalSign ECC Root CA R4 in NSS.
• Bug 1733560 - Remove Expired Root Certificates from NSS - DST Root CA X3.
• Bug 1740807 - Remove Expiring Cybertrust Global Root and GlobalSign root certificates from NSS.
• Bug 1741930 - Add renewed Autoridad de Certificacion Firmaprofesional CIF A62634068 root certificate to NSS.
• Bug 1740095 - Add iTrusChina ECC root certificate to NSS.
• Bug 1740095 - Add iTrusChina RSA root certificate to NSS.
• Bug 1738805 - Add ISRG Root X2 root certificate to NSS.
• Bug 1733012 - Add Chunghwa Telecom's HiPKI Root CA - G1 root certificate to NSS.
• Bug 1738028 - Avoid a clang 13 unused variable warning in opt build.
• Bug 1735028 - Check for missing signedData field.
• Bug 1737470 - Ensure DER encoded signatures are within size limits.

NSS 3.74 shared libraries are backwards-compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with this new version of the shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.

Bugs discovered should be reported by filing a bug report at <https://bugzilla.mozilla.org/enter_bug.cgi?product=NSS>

A copy of these release notes will be available at <https://firefox-source-docs.mozilla.org/security/nss/releases/index.html> though you should expect a small delay.

Best,
Benjamin

Reply all
Reply to author
Forward
0 new messages