NSS 3.60 release notes¶
The NSS team has released Network Security Services (NSS) 3.60 on 11 December 2020, which is a minor release.
The NSS team would like to recognize first-time contributors:
The HG tag is NSS_3_60_RTM. NSS 3.60 requires NSPR 4.29 or newer.
NSS 3.60 source distributions are available on ftp.mozilla.org for secure HTTPS download:
Other releases are available Release notes for recent versions of NSS.
TLS 1.3 Encrypted Client Hello (draft-ietf-tls-esni-08) support has been added, replacing the ESNI (draft-ietf-tls-esni-01). See bug 1654332 for more information.
Bug 1654332 - Implement Encrypted Client Hello (draft-ietf-tls-esni-08) in NSS.
Bug 1678189 - Update CA list version to 2.46.
Bug 1670769 - Remove 10 GeoTrust, thawte, and VeriSign root certs from NSS.
Bug 1678166 - Add NAVER Global Root Certification Authority root cert to NSS.
Bug 1678384 - Add a build flag to allow building nssckbi-testlib in m-c.
Bug 1570539 - Remove -X alt-server-hello option from tstclnt.
Bug 1675523 - Fix incorrect pkcs11t.h value CKR_PUBLIC_KEY_INVALID.
Bug 1642174 - Fix PowerPC ABI version 1 build failure.
Bug 1674819 - Fix undefined shift in fuzzer mode.
Bug 1678990 - Fix ARM crypto extensions detection on macOS.
Bug 1679290 - Fix lock order inversion and potential deadlock with libnsspem.
Bug 1680400 - Fix memory leak in PK11_UnwrapPrivKey.
This Bugzilla query returns all the bugs fixed in NSS 3.60:
NSS 3.60 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 3.60 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.