NSS 3.57 release notes¶
Introduction¶
The NSS team has released Network Security Services (NSS) 3.57 on 18 September 2020, which is a minor release.
The NSS team would like to recognize first-time contributors:
Khem Raj
Distribution Information¶
The HG tag is NSS_3_57_RTM. NSS 3.57 requires NSPR 4.29 or newer.
NSS 3.57 source distributions are available on ftp.mozilla.org for secure HTTPS download:
Other releases are available Release notes for recent versions of NSS.
Notable Changes in NSS 3.57¶
NSPR dependency updated to 4.29.
Bugs fixed in NSS 3.57¶
Bug 1651211 - Remove EE Certification Centre Root CA certificate.
Bug 1653092 - Turn off Websites Trust Bit for OISTE WISeKey Global Root GA CA.
Bug 1656077 - Remove Taiwan Government Root Certification Authority certificate.
Bug 1663049 - Add SecureTrust’s Trustwave Global root certificates to NSS.
Bug 1659256 - AArch64 AES optimization shouldn’t be enabled with gcc 4.8.
Bug 1651834 - Fix Clang static analyzer warnings.
Bug 1661378 - Fix Build failure with Clang 11.
Bug 1659727 - Fix mpcpucache.c invalid output constraint on Linux/ARM.
Bug 1662738 - Only run freebl_fips_RNG_PowerUpSelfTest when linked with NSPR.
Bug 1661810 - Fix Crash @ arm_aes_encrypt_ecb_128 when building with Clang 11.
Bug 1659252 - Fix Make build with NSS_DISABLE_DBM=1.
Bug 1660304 - Add POST tests for KDFs as required by FIPS.
Bug 1663346 - Use 64-bit compilation on e2k architecture.
Bug 1605922 - Account for negative sign in mp_radix_size.
Bug 1653641 - Cleanup inaccurate DTLS comments, code review fixes.
Bug 1660372 - NSS 3.57 should depend on NSPR 4.29
Bug 1660734 - Fix Makefile typos.
Bug 1660735 - Fix Makefile typos.
This Bugzilla query returns all the bugs fixed in NSS 3.57:
Compatibility¶
NSS 3.57 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 3.57 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.
Feedback¶
Bugs discovered should be reported by filing a bug report with bugzilla.mozilla.org (product NSS).