Introduction
The NSS team has released Network Security Services (NSS) 3.47 on 18 October 2019, which is a minor release.
The NSS team would like to recognize first-time contributors:
- Christian Weisgerber
- Deian Stefan
- Jenine
The HG tag is NSS_3_47_RTM. NSS 3.47 requires NSPR 4.23 or newer.
NSS 3.47 source distributions are available on ftp.mozilla.org for secure HTTPS download:
Other releases are available in NSS Releases.
Upcoming changes to default TLS configuration
The next NSS team plans to make two changes to the default TLS configuration in NSS 3.48, which will be released in early December:
Notable Changes in NSS 3.47
- Bug 1152625 - Support AES HW acceleration on ARMv8
- Bug 1267894 - Allow per-socket run-time ordering of the cipher suites presented in ClientHello
- Bug 1570501 - Add CMAC to FreeBL and PKCS #11 libraries
Bugs fixed in NSS 3.47
- Bug 1459141 - Make softoken CBC padding removal constant time
- Bug 1589120 - More CBC padding tests
- Bug 1465613 - Add ability to distrust certificates issued after a certain date for a specified root cert
- Bug 1588557 - Bad debug statement in tls13con.c
- Bug 1579060 - mozilla::pkix tag definitions for issuerUniqueID and subjectUniqueID shouldn't have the CONSTRUCTED bit set
- Bug 1583068 - NSS 3.47 should pick up fix from bug 1575821 (NSPR 4.23)
- Bug 1152625 - Support AES HW acceleration on ARMv8
- Bug 1549225 - Disable DSA signature schemes for TLS 1.3
- Bug 1586947 - PK11_ImportAndReturnPrivateKey does not store nickname for EC keys
- Bug 1586456 - Unnecessary conditional in pki3hack, pk11load and stanpcertdb
- Bug 1576307 - Check mechanism param and param length before casting to mechanism-specific structs
- Bug 1577953 - Support longer (up to RFC maximum) HKDF outputs
- Bug 1508776 - Remove refcounting from sftk_FreeSession (CVE-2019-11756)
- Bug 1494063 - Support TLS Exporter in tstclnt and selfserv
- Bug 1581024 - Heap overflow in NSS utility "derdump"
- Bug 1582343 - Soft token MAC verification not constant time
- Bug 1578238 - Handle invald tag sizes for CKM_AES_GCM
- Bug 1576295 - Check all bounds when encrypting with SEED_CBC
- Bug 1580286 - NSS rejects TLS 1.2 records with large padding with SHA384 HMAC
- Bug 1577448 - Create additional nested S/MIME test messages for Thunderbird
- Bug 1399095 - Allow nss-try to be used to test NSPR changes
- Bug 1267894 - libSSL should allow selecting the order of cipher suites in ClientHello
- Bug 1581507 - Fix unportable grep expression in test scripts
- Bug 1234830 - [CID 1242894][CID 1242852] unused values
- Bug 1580126 - Fix build failure on aarch64_be while building freebl/gcm
- Bug 1385039 - Build NSPR tests as part of NSS continuous integration
- Bug 1581391 - Fix build on OpenBSD/arm64 after bug #1559012
- Bug 1581041 - mach-commands -> mach-completion
- Bug 1558313 - Code bugs found by clang scanners.
- Bug 1542207 - Limit policy check on signature algorithms to known algorithms
- Bug 1560329 - drbg: add continuous self-test on entropy source
- Bug 1579290 - ASAN builds should disable LSAN while building
- Bug 1385061 - Build NSPR tests with NSS make; Add gyp parameters to build/run NSPR tests
- Bug 1577359 - Build atob and btoa for Thunderbird
- Bug 1579036 - Confusing error when trying to export non-existent cert with pk12util
- Bug 1578626 - [CID 1453375] UB: decrement nullptr.
- Bug 1578751 - Ensure a consistent style for pk11_find_certs_unittest.cc
- Bug 1570501 - Add CMAC to FreeBL and PKCS #11 libraries
- Bug 657379 - NSS uses the wrong OID for signatureAlgorithm field of signerInfo in CMS for DSA and ECDSA
- Bug 1576664 - Remove -mms-bitfields from mingw NSS build.
- Bug 1577038 - add PK11_GetCertsFromPrivateKey to return all certificates with public keys matching a particular private key
This Bugzilla query returns all the bugs fixed in NSS 3.47:
https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&classification=Components&query_format=advanced&product=NSS&target_milestone=3.47
Compatibility
NSS 3.47 shared libraries are backward compatible with all older NSS 3.x shared libraries. A program linked with older NSS 3.x shared libraries will work with NSS 3.47 shared libraries without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs to the functions listed in NSS Public Functions will remain compatible with future versions of the NSS shared libraries.
Feedback
Bugs discovered should be reported by filing a bug report with bugzilla.mozilla.org (product NSS).