[CLSA-2026:1771410337] Update of nss
Type:
bugfix
Severity:
None
Release date:
2026-02-18 14:53:11 UTC
Description:
- update to CKBI 2.82 from NSS 3.120 - updated certificates: - # Certificate "GlobalSign Root CA" - # Certificate "Entrust.net Premium 2048 Secure Server CA" - # Certificate "Comodo AAA Services root" - # Certificate "XRamp Global CA Root" - # Certificate "Go Daddy Class 2 CA" - # Certificate "Starfield Class 2 CA" - removed certificates: - # Certificate "Baltimore CyberTrust Root" - added certificates: - # Certificate "TrustAsia SMIME ECC Root CA" - # Certificate "TrustAsia SMIME RSA Root CA" - # Certificate "TrustAsia TLS ECC Root CA" - # Certificate "TrustAsia TLS RSA Root CA" - # Certificate "SwissSign RSA SMIME Root CA 2022 - 1" - # Certificate "SwissSign RSA TLS Root CA 2022 - 1" - # Certificate "OISTE Client Root ECC G1" - # Certificate "OISTE Client Root RSA G1" - # Certificate "OISTE Server Root ECC G1" - # Certificate "OISTE Server Root RSA G1"
Updated packages:
  • nss-3.44.0-12.el6.tuxcare.els9.i686.rpm
    sha:2602c0c8c84eaddeea78438168693b50d61bdeec9e9355b9904d9804ccc93b35
  • nss-3.44.0-12.el6.tuxcare.els9.x86_64.rpm
    sha:7b236b16e65bbf169432c1a9f511cf588e30b67cd627d97dae556aca47ce5e76
  • nss-devel-3.44.0-12.el6.tuxcare.els9.i686.rpm
    sha:2c852d686b3735add3a28c4286db457e714c178ce5a76f589276f920f336352f
  • nss-devel-3.44.0-12.el6.tuxcare.els9.x86_64.rpm
    sha:65c32ca6c1d4653f25a156142abaad45f196bfd2f9dcc89aee930e0c6a18825b
  • nss-pkcs11-devel-3.44.0-12.el6.tuxcare.els9.i686.rpm
    sha:a1926fa7115626e901b7adfe56ced39389da121bc530f71bfd7438b39ab06214
  • nss-pkcs11-devel-3.44.0-12.el6.tuxcare.els9.x86_64.rpm
    sha:671d66c279095bd1266993f41d96c32567ad1e4df48f64d83342def3f2b2aac8
  • nss-sysinit-3.44.0-12.el6.tuxcare.els9.x86_64.rpm
    sha:2bfdee78ca82a02791665ed2fc5943f9a9acbd7ac67211d37e181740a91ac149
  • nss-tools-3.44.0-12.el6.tuxcare.els9.x86_64.rpm
    sha:2370c2107d5c8d9e7fcba2d830f02563cc01ebff237a47cf6423162f5bd17bd5
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.