[CLSA-2026:1772644086] Update of nss
Type:
bugfix
Severity:
None
Release date:
2026-03-04 17:08:11 UTC
Description:
- update to CKBI 2.82 from NSS 3.120 - updated certificates: - # Certificate "GlobalSign Root CA" - # Certificate "Entrust.net Premium 2048 Secure Server CA" - # Certificate "Comodo AAA Services root" - # Certificate "XRamp Global CA Root" - # Certificate "Go Daddy Class 2 CA" - # Certificate "Starfield Class 2 CA" - removed certificates: - # Certificate "Baltimore CyberTrust Root" - added certificates: - # Certificate "TrustAsia SMIME ECC Root CA" - # Certificate "TrustAsia SMIME RSA Root CA" - # Certificate "TrustAsia TLS ECC Root CA" - # Certificate "TrustAsia TLS RSA Root CA" - # Certificate "SwissSign RSA SMIME Root CA 2022 - 1" - # Certificate "SwissSign RSA TLS Root CA 2022 - 1" - # Certificate "OISTE Client Root ECC G1" - # Certificate "OISTE Client Root RSA G1" - # Certificate "OISTE Server Root ECC G1" - # Certificate "OISTE Server Root RSA G1"
Updated packages:
  • nss-3.44.0-12.el6.tuxcare.els9.i686.rpm
    sha:7cd097f05da1a185df31c75bda886eccbb76380ceab6cea57d091e1425a6d907
  • nss-3.44.0-12.el6.tuxcare.els9.x86_64.rpm
    sha:943160d5114f3cda65158d16f07596999896e64bacb54b4f100a088f1778d0ad
  • nss-devel-3.44.0-12.el6.tuxcare.els9.i686.rpm
    sha:9acaaa3e604e8f53accb7b187146743fc22f8ade97d716f66e0327cb9d0b2ed1
  • nss-devel-3.44.0-12.el6.tuxcare.els9.x86_64.rpm
    sha:6c72eca3314baaa695ae501d00f0161452831c01ff48817192db56b79a52fbbc
  • nss-pkcs11-devel-3.44.0-12.el6.tuxcare.els9.i686.rpm
    sha:491494cd1121c1b37aea2cbcab81f72e344c6d51007988e4f15cb79f34303677
  • nss-pkcs11-devel-3.44.0-12.el6.tuxcare.els9.x86_64.rpm
    sha:e6d386ed8429ccf4d0187149625507f18869abfe5e002e1f049f72efb1935070
  • nss-sysinit-3.44.0-12.el6.tuxcare.els9.x86_64.rpm
    sha:2714252167ffbb7a579e7a30aad581790a88f8e18c83a3b762d4b72929b97193
  • nss-tools-3.44.0-12.el6.tuxcare.els9.x86_64.rpm
    sha:c4a33583d7bd5fc51173a8d06c15afc0410397390517924ea17502c2129a9102
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.