NSS 3.47 release notes¶
Introduction¶
The NSS team has released Network Security Services (NSS) 3.47 on 18 October 2019, which is a minor release.
The NSS team would like to recognize first-time contributors:
Christian Weisgerber
Deian Stefan
Jenine
Distribution Information¶
The HG tag is NSS_3_47_RTM. NSS 3.47 requires NSPR 4.23 or newer.
NSS 3.47 source distributions are available on ftp.mozilla.org for secure HTTPS download:
Other releases are available Release notes for recent versions of NSS.
Upcoming changes to default TLS configuration¶
The next NSS team plans to make two changes to the default TLS configuration in NSS 3.48, which will be released in early December:
TLS 1.3 will be the default maximum TLS version. See Bug 1573118 for details.
TLS extended master secret will be enabled by default, where possible. See Bug 1575411 for details.
Notable Changes in NSS 3.47¶
Bug 1152625 - Support AES HW acceleration on ARMv8
Bug 1267894 - Allow per-socket run-time ordering of the cipher suites presented in ClientHello
Bug 1570501 - Add CMAC to FreeBL and PKCS #11 libraries
Bugs fixed in NSS 3.47¶
Bug 1459141 - Make softoken CBC padding removal constant time
Bug 1589120 - More CBC padding tests
Bug 1465613 - Add ability to distrust certificates issued after a certain date for a specified root cert
Bug 1588557 - Bad debug statement in tls13con.c
Bug 1579060 - mozilla::pkix tag definitions for issuerUniqueID and subjectUniqueID shouldn’t have the CONSTRUCTED bit set
Bug 1583068 - NSS 3.47 should pick up fix from bug 1575821 (NSPR 4.23)
Bug 1152625 - Support AES HW acceleration on ARMv8
Bug 1549225 - Disable DSA signature schemes for TLS 1.3
Bug 1586947 - PK11_ImportAndReturnPrivateKey does not store nickname for EC keys
Bug 1586456 - Unnecessary conditional in pki3hack, pk11load and stanpcertdb
Bug 1576307 - Check mechanism param and param length before casting to mechanism-specific structs
Bug 1577953 - Support longer (up to RFC maximum) HKDF outputs
Bug 1508776 - Remove refcounting from sftk_FreeSession (CVE-2019-11756)
Bug 1494063 - Support TLS Exporter in tstclnt and selfserv
Bug 1581024 - Heap overflow in NSS utility “derdump”
Bug 1582343 - Soft token MAC verification not constant time
Bug 1578238 - Handle invald tag sizes for CKM_AES_GCM
Bug 1576295 - Check all bounds when encrypting with SEED_CBC
Bug 1580286 - NSS rejects TLS 1.2 records with large padding with SHA384 HMAC
Bug 1577448 - Create additional nested S/MIME test messages for Thunderbird
Bug 1399095 - Allow nss-try to be used to test NSPR changes
Bug 1267894 - libSSL should allow selecting the order of cipher suites in ClientHello
Bug 1581507 - Fix unportable grep expression in test scripts
Bug 1234830 - [CID 1242894][CID 1242852] unused values
Bug 1580126 - Fix build failure on aarch64_be while building freebl/gcm
Bug 1385039 - Build NSPR tests as part of NSS continuous integration
Bug 1581391 - Fix build on OpenBSD/arm64 after bug #1559012
Bug 1581041 - mach-commands -> mach-completion
Bug 1558313 - Code bugs found by clang scanners.
Bug 1542207 - Limit policy check on signature algorithms to known algorithms
Bug 1560329 - drbg: add continuous self-test on entropy source
Bug 1579290 - ASAN builds should disable LSAN while building
Bug 1385061 - Build NSPR tests with NSS make; Add gyp parameters to build/run NSPR tests
Bug 1577359 - Build atob and btoa for Thunderbird
Bug 1579036 - Confusing error when trying to export non-existent cert with pk12util
Bug 1578626 - [CID 1453375] UB: decrement nullptr.
Bug 1578751 - Ensure a consistent style for pk11_find_certs_unittest.cc
Bug 1570501 - Add CMAC to FreeBL and PKCS #11 libraries
Bug 657379 - NSS uses the wrong OID for signatureAlgorithm field of signerInfo in CMS for DSA and ECDSA
Bug 1576664 - Remove -mms-bitfields from mingw NSS build.
Bug 1577038 - add PK11_GetCertsFromPrivateKey to return all certificates with public keys matching a particular private key
This Bugzilla query returns all the bugs fixed in NSS 3.47:
Compatibility¶
NSS 3.47 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 3.47 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.
Feedback¶
Bugs discovered should be reported by filing a bug report with bugzilla.mozilla.org (product NSS).