<div class="container">
<h1>Recommended update for mozilla-nss</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-RU-2026:1467-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2026-04-20T08:10:50Z</td>
</tr>
<tr>
<th>Rating:</th>
<td>moderate</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">SUSE Linux Enterprise Micro 5.2</li>
<li class="list-group-item">SUSE Linux Enterprise Micro for Rancher 5.2</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that can now be installed.</p>
<h2>Description:</h2>
<p>This update for mozilla-nss fixes the following issues:</p>
<p>Update to NSS 3.112.4:</p>
<ul>
<li>improve error handling in PK11_ImportPrivateKeyInfoAndReturnKey.</li>
<li>Improving the allocation of S/MIME DecryptSymKey.</li>
<li>store email on subject cache_entry in NSS trust domain.</li>
<li>Heap use-after-free in cert_VerifyCertChainOld via dangling certsList[] entry on NameConstraints violation.</li>
<li>Improve size calculations in CMS content buffering.</li>
<li>avoid integer overflow while escaping RFC822 Names.</li>
<li>Reject excessively large ASN.1 SEQUENCE OF in quickder.</li>
<li>Deep copy profile data in CERT_FindSMimeProfile.</li>
<li>Improve input validation in DSAU signature decoding.</li>
<li>avoid integer overflow in RSA_EMSAEncodePSS.</li>
<li>RSA_EMSAEncodePSS should validate the length of mHash.</li>
<li>Add a maximum cert uncompressed len and tests.</li>
<li>Clarify extension negotiation mechanism for TLS Handshakes.</li>
<li>ensure permittedSubtrees don't match wildcards that could be outside the permitted tree.</li>
<li>Fix integer underflow in tls13_AEAD when ciphertext is shorter than tag.</li>
<li>Remove invalid PORT_Free().</li>
<li>free digest objects in SEC_PKCS7DecoderFinish if they haven't already been freed.</li>
<li>make ss->ssl3.hs.cookie an owned-copy of the cookie.</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
SUSE Linux Enterprise Micro 5.2
<br/>
<code>zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-1467=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Micro for Rancher 5.2
<br/>
<code>zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-1467=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
<ul>
<li>mozilla-nss-certs-3.112.4-150000.3.138.1</li>
<li>libfreebl3-3.112.4-150000.3.138.1</li>
<li>libfreebl3-debuginfo-3.112.4-150000.3.138.1</li>
<li>mozilla-nss-certs-debuginfo-3.112.4-150000.3.138.1</li>
<li>libsoftokn3-debuginfo-3.112.4-150000.3.138.1</li>
<li>mozilla-nss-tools-debuginfo-3.112.4-150000.3.138.1</li>
<li>mozilla-nss-3.112.4-150000.3.138.1</li>
<li>mozilla-nss-debugsource-3.112.4-150000.3.138.1</li>
<li>mozilla-nss-debuginfo-3.112.4-150000.3.138.1</li>
<li>mozilla-nss-tools-3.112.4-150000.3.138.1</li>
<li>libsoftokn3-3.112.4-150000.3.138.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
<ul>
<li>mozilla-nss-certs-3.112.4-150000.3.138.1</li>
<li>libfreebl3-3.112.4-150000.3.138.1</li>
<li>libfreebl3-debuginfo-3.112.4-150000.3.138.1</li>
<li>mozilla-nss-certs-debuginfo-3.112.4-150000.3.138.1</li>
<li>libsoftokn3-debuginfo-3.112.4-150000.3.138.1</li>
<li>mozilla-nss-tools-debuginfo-3.112.4-150000.3.138.1</li>
<li>mozilla-nss-3.112.4-150000.3.138.1</li>
<li>mozilla-nss-debugsource-3.112.4-150000.3.138.1</li>
<li>mozilla-nss-debuginfo-3.112.4-150000.3.138.1</li>
<li>mozilla-nss-tools-3.112.4-150000.3.138.1</li>
<li>libsoftokn3-3.112.4-150000.3.138.1</li>
</ul>
</li>
</ul>
</div>