[ANNOUNCE] NSS 3.60 Release

Skip to first unread message


Dec 14, 2020, 5:20:25 PM12/14/20
to mozilla-dev...@lists.mozilla.org
The NSS team has released Network Security Services (NSS) 3.60 on 11 December 2020, which is a minor release.

The NSS team would like to recognize first-time contributors:

* yogesh

The HG tag is NSS_3_60_RTM. NSS 3.60 requires NSPR 4.29 or newer.

NSS 3.60 source distributions are available on ftp.mozilla.org for secure HTTPS download: https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_60_RTM/src/

Notable changes in NSS 3.60: 
* TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support has been added, replacing the previous ESNI (draft-ietf-tls-esni-01) implementation. See bug 1654332 for more information. 
* December 2020 batch of Root CA changes, builtins library updated to version 2.46. See bugs 1678189, 1678166, and 1670769 for more information.

Bugs fixed in NSS 3.60:
 * Bug 1654332 - Implement Encrypted Client Hello (draft-ietf-tls-esni-08).
 * Bug 1678189 - Update CA list version to 2.46.
 * Bug 1670769 - Remove 10 GeoTrust, thawte, and VeriSign root certs from NSS.
 * Bug 1678166 - Add NAVER Global Root Certification Authority root cert to NSS.
 * Bug 1678384 - Add a build flag to allow building nssckbi-testlib in mozilla-central.
 * Bug 1570539 - Remove -X alt-server-hello option from tstclnt.
 * Bug 1675523 - Fix incorrect pkcs11t.h value CKR_PUBLIC_KEY_INVALID.
 * Bug 1642174 - Fix PowerPC ABI version 1 build failure.
 * Bug 1674819 - Fix undefined shift in fuzzer mode.
 * Bug 1678990 - Fix ARM crypto extensions detection on macOS.
 * Bug 1679290 - Fix lock order inversion and potential deadlock with libnsspem.
 * Bug 1680400 - Fix memory leak in PK11_UnwrapPrivKey.

This Bugzilla query returns all the bugs fixed in NSS 3.60:


NSS 3.60 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 3.60 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.

Bugs discovered should be reported by filing a bug report with bugzilla.mozilla.org (product NSS).

Please refer to the release notes for the complete list of changes:
Reply all
Reply to author
0 new messages