Dear all, 

Network Security Services (NSS) 3.76 was released on 03 March 2022. 

The HG tag is NSS_3_76_RTM. This version of NSS requires NSPR 4.32 or 
newer. 

NSS 3.76 source distributions are available on ftp.mozilla.org for 
secure HTTPS download: 
<
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_76_RTM/src/>
 


Changes: 
   - Bug 1755555 - Hold tokensLock through nssToken_GetSlot calls in 
nssTrustDomain_GetActiveSlots. 
   - Bug 1370866 - Check return value of PK11Slot_GetNSSToken. 
   - Bug 1747957 - Use Wycheproof JSON for RSASSA-PSS
   - Bug 1679803 - Add SHA256 fingerprint comments to old certdata.txt 
entries. 
   - Bug 1753505 - Avoid truncating files in nss-release-helper.py.
   - Bug 1751157 - Throw illegal_parameter alert for illegal extensions in 
handshake message.

NSS 3.76 shared libraries are backwards-compatible with all older NSS 
3.x shared libraries. A program linked with older NSS 3.x shared 
libraries will work with this new version of the shared libraries 
without recompiling or relinking. Furthermore, applications that 
restrict their use of NSS APIs to the functions listed in NSS Public 
Functions will remain compatible with future versions of the NSS 
shared libraries. 

Bugs discovered should be reported by filing a bug report at 
<https://bugzilla.mozilla.org/enter_bug.cgi?product=NSS> 

A copy of these release notes will be available at 
<https://firefox-source-docs.mozilla.org/security/nss/releases/index.html> 
though you should expect a small delay. 

Best, 
Dennis

-- 
You received this message because you are subscribed to the Google Groups 
"dev-tech-crypto@mozilla.org" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dev-tech-crypto+unsubscr...@mozilla.org.
To view this discussion on the web visit 
https://groups.google.com/a/mozilla.org/d/msgid/dev-tech-crypto/23907c6e-f06f-4c9d-8289-c50cfbf451bdn%40mozilla.org.

Reply via email to