The NSS Development Team announces the release of NSS 3.16.2.3

Network Security Services (NSS) 3.16.2.3 is a patch release
for NSS 3.16, to fix a regression.

New functionality:
* TLS_FALLBACK_SCSV is a signaling cipher suite value that indicates a
  handshake is the result of TLS version fallback.

New Macros:
* SSL_ENABLE_FALLBACK_SCSV - an SSL socket option that enables
  TLS_FALLBACK_SCSV. Off by default.
* SSL_ERROR_INAPPROPRIATE_FALLBACK_ALERT - a new SSL error code.
* TLS_FALLBACK_SCSV - a a signaling cipher suite value that indicates a
  handshake is the result of TLS version fallback.

The following bug has been resolved in NSS 3.16.2.3:
* Bug 1057161 - NSS hangs with 100% CPU on invalid EC key
* Bug 1036735 - Add support for draft-ietf-tls-downgrade-scsv

The full release notes are available at
https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.16.2.3_release_notes

The HG tag is NSS_3_16_2_3_RTM. NSS 3.16.2.3 requires NSPR 4.10.6 or
newer.

NSS 3.16.2.3 source distributions are also available on ftp.mozilla.org
for secure HTTPS download:
https://ftp.mozilla.org/pub/mozilla.org/security/nss/releases/NSS_3_16_2_3_RTM/src/


-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to