summaryrefslogtreecommitdiffstats
path: root/security/nss/doc/rst/legacy/nss_releases/nss_3.51_release_notes/index.rst
diff options
context:
space:
mode:
Diffstat (limited to 'security/nss/doc/rst/legacy/nss_releases/nss_3.51_release_notes/index.rst')
-rw-r--r--security/nss/doc/rst/legacy/nss_releases/nss_3.51_release_notes/index.rst103
1 files changed, 103 insertions, 0 deletions
diff --git a/security/nss/doc/rst/legacy/nss_releases/nss_3.51_release_notes/index.rst b/security/nss/doc/rst/legacy/nss_releases/nss_3.51_release_notes/index.rst
new file mode 100644
index 0000000000..4eb0a40166
--- /dev/null
+++ b/security/nss/doc/rst/legacy/nss_releases/nss_3.51_release_notes/index.rst
@@ -0,0 +1,103 @@
+.. _mozilla_projects_nss_nss_3_51_release_notes:
+
+NSS 3.51 release notes
+======================
+
+`Introduction <#introduction>`__
+--------------------------------
+
+.. container::
+
+ The NSS team has released Network Security Services (NSS) 3.51 on **6 March 2020**, which is a
+ minor release.
+
+ The NSS team would like to recognize first-time contributors:
+
+ - Dmitry Baryshkov
+ - Victor Tapia
+
+.. _distribution_information:
+
+`Distribution Information <#distribution_information>`__
+--------------------------------------------------------
+
+.. container::
+
+ The HG tag is NSS_3_51_RTM. NSS 3.51 requires NSPR 4.25 or newer.
+
+ NSS 3.51 source distributions are available on ftp.mozilla.org for secure HTTPS download:
+
+ - Source tarballs:
+ https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_51_RTM/src/
+
+ Other releases are available :ref:`mozilla_projects_nss_nss_releases`.
+
+.. _notable_changes_in_nss_3.51:
+
+`Notable Changes in NSS 3.51 <#notable_changes_in_nss_3.51>`__
+--------------------------------------------------------------
+
+.. container::
+
+ - Updated DTLS 1.3 implementation to Draft-34. See `Bug
+ 1608892 <https://bugzilla.mozilla.org/show_bug.cgi?id=1608892>`__ for details.
+
+.. _bugs_fixed_in_nss_3.51:
+
+`Bugs fixed in NSS 3.51 <#bugs_fixed_in_nss_3.51>`__
+----------------------------------------------------
+
+.. container::
+
+ - `Bug 1608892 <https://bugzilla.mozilla.org/show_bug.cgi?id=1608892>`__ - Update DTLS 1.3
+ implementation to draft-34.
+ - `Bug 1611209 <https://bugzilla.mozilla.org/show_bug.cgi?id=1611209>`__ - Correct swapped
+ PKCS11 values of CKM_AES_CMAC and CKM_AES_CMAC_GENERAL
+ - `Bug 1612259 <https://bugzilla.mozilla.org/show_bug.cgi?id=1612259>`__ - Complete integration
+ of Wycheproof ECDH test cases
+ - `Bug 1614183 <https://bugzilla.mozilla.org/show_bug.cgi?id=1614183>`__ - Check if PPC
+ \__has_include(<sys/auxv.h>)
+ - `Bug 1614786 <https://bugzilla.mozilla.org/show_bug.cgi?id=1614786>`__ - Fix a compilation
+ error for ‘getFIPSEnv’ "defined but not used"
+ - `Bug 1615208 <https://bugzilla.mozilla.org/show_bug.cgi?id=1615208>`__ - Send DTLS version
+ numbers in DTLS 1.3 supported_versions extension to avoid an incompatibility.
+ - `Bug 1538980 <https://bugzilla.mozilla.org/show_bug.cgi?id=1538980>`__ - SECU_ReadDERFromFile
+ calls strstr on a string that isn't guaranteed to be null-terminated
+ - `Bug 1561337 <https://bugzilla.mozilla.org/show_bug.cgi?id=1561337>`__ - Correct a warning for
+ comparison of integers of different signs: 'int' and 'unsigned long' in
+ security/nss/lib/freebl/ecl/ecp_25519.c:88
+ - `Bug 1609751 <https://bugzilla.mozilla.org/show_bug.cgi?id=1609751>`__ - Add test for mp_int
+ clamping
+ - `Bug 1582169 <https://bugzilla.mozilla.org/show_bug.cgi?id=1582169>`__ - Don't attempt to read
+ the fips_enabled flag on the machine unless NSS was built with FIPS enabled
+ - `Bug 1431940 <https://bugzilla.mozilla.org/show_bug.cgi?id=1431940>`__ - Fix a null pointer
+ dereference in BLAKE2B_Update
+ - `Bug 1617387 <https://bugzilla.mozilla.org/show_bug.cgi?id=1617387>`__ - Fix compiler warning
+ in secsign.c
+ - `Bug 1618400 <https://bugzilla.mozilla.org/show_bug.cgi?id=1618400>`__ - Fix a OpenBSD/arm64
+ compilation error: unused variable 'getauxval'
+ - `Bug 1610687 <https://bugzilla.mozilla.org/show_bug.cgi?id=1610687>`__ - Fix a crash on
+ unaligned CMACContext.aes.keySchedule when using AES-NI intrinsics
+
+ This Bugzilla query returns all the bugs fixed in NSS 3.51:
+
+ https://bugzilla.mozilla.org/buglist.cgi?resolution=FIXED&classification=Components&query_format=advanced&product=NSS&target_milestone=3.51
+
+`Compatibility <#compatibility>`__
+----------------------------------
+
+.. container::
+
+ NSS 3.51 shared libraries are backward compatible with all older NSS 3.x shared libraries. A
+ program linked with older NSS 3.x shared libraries will work with NSS 3.51 shared libraries
+ without recompiling or relinking. Furthermore, applications that restrict their use of NSS APIs
+ to the functions listed in NSS Public Functions will remain compatible with future versions of
+ the NSS shared libraries.
+
+`Feedback <#feedback>`__
+------------------------
+
+.. container::
+
+ Bugs discovered should be reported by filing a bug report with
+ `bugzilla.mozilla.org <https://bugzilla.mozilla.org/enter_bug.cgi?product=NSS>`__ (product NSS). \ No newline at end of file