Voting is open for a new IC release - 92e6b0e

Hello there!

we are happy to announce that voting is now open for a new IC release.
The NNS proposal is here: IC NNS Proposal 65530.

There are lots of exciting new features and bugfixes. Here is a more complete list of changes:

* Consensus: Add pool manager requested cache
* Consensus: Consensus support of ECDSA KeyId
* Consensus: Remove ecdsa signatures feature
* Crypto: Avoid unnecessary cloning in ic-crypto-node-key-validation
* Crypto: Implement threshold ECDSA key removal
* Crypto: Add Tokio runtime handle to the Crypto component to allow async communication with the vault.
* Execution: Increase instruction limit for install_code on verified subnets
* Execution: Support for bitcoin regtest in local replica environments
* Execution: Add `bitcoin_get_current_fee_percentiles` endpoint to the management canister
* Message Routing: Check registry mutation sizes
* Networking: Add a negative dep check that the replica should not depend on the ic-canister-client library
* Networking: Fix canister http receiver
* Networking: Panic on unrecoverable errors instead of propagating errors and letting the client panic
* Networking: Use a concurrency buffer in-front of the threadpool that executes queries
* Node: Don't clear extra mounts
* Node: Provide config injection mechanism
* Orchestrator: Check integrity override
* Runtime: Followup cleanup after ExecResult change
* Runtime: Forward canister sandbox log messages to stderr
* Runtime: NonReplicatedQuery: Take source from NonReplicatedQueryKind
* Runtime: Observe complexity of most System APIs
* Runtime: Upgrade Wasmtime to version 0.37.0
* Runtime: Verify that the memory size matches the page map size
* Runtime: query refactor cleanup
* Runtime: update refactor cleanup
* Various tech-debt management: code refactoring, docs, bug fixes, test updates

And a complete list of changes can of course be found on GitHub.
Please reply to this message if you have any questions or comments.


Sadly the proposal didn’t get the nice round number 65536. But it was close.


There’s a hotfix (66888) for this release to solve potential issues in the subnet running OpenChat (
This fix be included in the upcoming weekly release