MDN’s new design is in Beta! A sneak peek: https://blog.mozilla.org/opendesign/mdns-new-design-beta/

NSS 3.19 release notes

Introduction

The NSS team has released Network Security Services (NSS) 3.19, which is a minor security release.

Distribution Information

The HG tag is NSS_3_19_RTM. NSS 3.19 requires NSPR 4.10.8 or newer.

NSS 3.19 source distributions are available on ftp.mozilla.org for secure HTTPS download:

Security Fixes in NSS 3.19

New in NSS 3.19

New Functionality

  • For some certificates, such as root CA certificates that don't embed any constraints, NSS might impose additional constraints such as name constraints. A new API (CERT_GetImposedNameConstraints) has been added that allows one to lookup imposed constraints.
  • It is possible to override the directory (SQLITE_LIB_DIR) in which the NSS build system will look for the sqlite library.

New Functions

  • in cert.h
    • CERT_GetImposedNameConstraints - Check if any imposed constraints exist for the given certificate, and if found, return the constraints as encoded certificate extensions.

Notable Changes in NSS 3.19

  • The SSL 3 protocol has been disabled by default.
  • NSS now more strictly validates TLS extensions and will fail a handshake that contains malformed extensions (bug 753136).
  • In TLS 1.2 handshakes, NSS advertises support for the SHA512 hash algorithm in order to be compatible with TLS servers that use certificates with a SHA512 signature (bug 1155922).

Bugs fixed in NSS 3.19

This Bugzilla query returns all the bugs fixed in NSS 3.19:

https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&classification=Components&query_format=advanced&product=NSS&target_milestone=3.19

Acknowledgements

The NSS development team would like to thank Karthikeyan Bhargavan from INRIA for responsibly disclosing the issue in bug 1086145.

Compatibility

NSS 3.19 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 3.19 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.

Feedback

Bugs discovered should be reported by filing a bug report with bugzilla.mozilla.org (product NSS).

 

Document Tags and Contributors

 Contributors to this page: meljag, rsleevi, Wtchang, kaie, m_t
 Last updated by: meljag,