NSS 3.121 release notes
Introduction
Network Security Services (NSS) 3.121 was released on 19 February 2026*.
Distribution Information
The HG tag is NSS_3_121_RTM. NSS 3.121 requires NSPR 4.38.2 or newer.
NSS 3.121 source distributions are available on ftp.mozilla.org for secure HTTPS download:
Other releases are available Release Notes.
Changes in NSS 3.121
Bug 2017366 - update vendored zlib to v1.3.2.
Bug 2012645 - Revert the unnecessary changes to intel-gcm-wrap.gyp.
Bug 2012645 - Use C fallback for AES-GCM on MinGW builds.
Bug 2005669 - fix ML-KEM PCT.
Bug 2017008 - Extend NSS Fuzzing docs.
Bug 2009552 - avoid integer overflow in platform-independent ghash.
Bug 2003189 - Fix errant whitespace in OISTE Server Root RSA G1 nickname.
Bug 2012313 - fix build with glibc-2.43 assignment discards ‘const’ qualifier from pointer.
Bug 2013188 - add gcm.gyp dependency for Solaris SPARC builds.
Bug 2010389 - Set nssckbi version to 2.84.
Bug 2010389 - Add e-Szigno TLS Root CA 2023 to NSS.
Bug 2005516 - allow manual selection of CPU_ARCH=x86_64 and ppc64 in coreconf/Darwin.mk.
Bug 2009998 - Update cryptofuzz version.
Bug 2001167: Paranoia assert.
Bug 2000737 - Darwin compatibility for intel-aes.S and intel-gcm.S.
Bug 2000737 - rename intel-{aes,gcm}.s to .S.
Bug 2000737 - rename C files for platform-specific ghash implementations.
Bug 2000737 - simplify compilation of platform-specific GCM and GHASH.
Bug 2007911 - FORWARD_NULL null deref of worker in p7decode.c (sec_pkcs7_decoder_abort_digests).
Bug 2008112 - Out-of-Bounds Read in ML-DSA Private Key Parsing (zero-length privateKey).