<div class="container">
<h1>Recommended update for openssl-certs</h1>
<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-RU-2024:4356-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2024-12-17T12:37:57Z</td>
</tr>
<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206212">bsc#1206212</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206622">bsc#1206622</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214248">bsc#1214248</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220356">bsc#1220356</a>
</li>
<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227525">bsc#1227525</a>
</li>
</ul>
</td>
</tr>
<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">
<li class="list-group-item">SUSE Linux Enterprise Server 11 SP4</li>
<li class="list-group-item">SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE</li>
</ul>
</td>
</tr>
</tbody>
</table>
<p>An update that has five fixes can now be installed.</p>
<h2>Description:</h2>
<p>This update for openssl-certs fixes the following issues:</p>
<ul>
<li>
<p>Updated to 2.68 state of Mozilla SSL root CAs (bsc#1227525)</p>
</li>
<li>
<p>Added: FIRMAPROFESIONAL CA ROOT-A WEB</p>
</li>
<li>
<p>Distrust: GLOBALTRUST 2020</p>
</li>
<li>
<p>Updated to 2.66 state of Mozilla SSL root CAs (bsc#1220356)</p>
</li>
</ul>
<p>Added:</p>
<ul>
<li>CommScope Public Trust ECC Root-01</li>
<li>CommScope Public Trust ECC Root-02</li>
<li>CommScope Public Trust RSA Root-01</li>
<li>CommScope Public Trust RSA Root-02</li>
<li>D-Trust SBR Root CA 1 2022</li>
<li>D-Trust SBR Root CA 2 2022</li>
<li>Telekom Security SMIME ECC Root 2021</li>
<li>Telekom Security SMIME RSA Root 2023</li>
<li>Telekom Security TLS ECC Root 2020</li>
<li>Telekom Security TLS RSA Root 2023</li>
<li>TrustAsia Global Root CA G3</li>
<li>TrustAsia Global Root CA G4</li>
</ul>
<p>Removed:</p>
<ul>
<li>Autoridad de Certificacion Firmaprofesional CIF A62634068</li>
<li>Chambers of Commerce Root - 2008</li>
<li>Global Chambersign Root - 2008</li>
<li>Security Communication Root CA</li>
<li>Symantec Class 1 Public Primary Certification Authority - G6</li>
<li>Symantec Class 2 Public Primary Certification Authority - G6</li>
<li>TrustCor ECA-1</li>
<li>TrustCor RootCert CA-1</li>
<li>TrustCor RootCert CA-2</li>
<li>VeriSign Class 1 Public Primary Certification Authority - G3</li>
<li>
<p>VeriSign Class 2 Public Primary Certification Authority - G3</p>
</li>
<li>
<p>Updated to 2.62 state of Mozilla SSL root CAs (bsc#1214248)</p>
</li>
</ul>
<p>Added:</p>
<ul>
<li>Atos TrustedRoot Root CA ECC G2 2020</li>
<li>Atos TrustedRoot Root CA ECC TLS 2021</li>
<li>Atos TrustedRoot Root CA RSA G2 2020</li>
<li>Atos TrustedRoot Root CA RSA TLS 2021</li>
<li>BJCA Global Root CA1</li>
<li>BJCA Global Root CA2</li>
<li>LAWtrust Root CA2 (4096)</li>
<li>Sectigo Public Email Protection Root E46</li>
<li>Sectigo Public Email Protection Root R46</li>
<li>Sectigo Public Server Authentication Root E46</li>
<li>Sectigo Public Server Authentication Root R46</li>
<li>SSL.com Client ECC Root CA 2022</li>
<li>SSL.com Client RSA Root CA 2022</li>
<li>SSL.com TLS ECC Root CA 2022</li>
<li>SSL.com TLS RSA Root CA 2022</li>
</ul>
<p>Removed CAs:</p>
<ul>
<li>Chambers of Commerce Root</li>
<li>E-Tugra Certification Authority</li>
<li>E-Tugra Global Root CA ECC v3</li>
<li>E-Tugra Global Root CA RSA v3</li>
<li>
<p>Hongkong Post Root CA 1</p>
</li>
<li>
<p>Updated to 2.60 state of Mozilla SSL root CAs (bsc#1206622)</p>
</li>
</ul>
<p>Removed CAs:</p>
<ul>
<li>Global Chambersign Root</li>
<li>EC-ACC</li>
<li>Network Solutions Certificate Authority</li>
<li>Staat der Nederlanden EV Root CA</li>
<li>SwissSign Platinum CA - G2</li>
</ul>
<p>Added CAs:</p>
<ul>
<li>DIGITALSIGN GLOBAL ROOT ECDSA CA</li>
<li>DIGITALSIGN GLOBAL ROOT RSA CA</li>
<li>Security Communication ECC RootCA1</li>
<li>Security Communication RootCA3</li>
</ul>
<p>Changed trust:</p>
<ul>
<li>
<p>TrustCor certificates only trusted up to Nov 30 (bsc#1206212)</p>
</li>
<li>
<p>Removed CAs (bsc#1206212) as most code does not handle "valid before nov 30 2022"
and it is not clear how many certs were issued for SSL middleware by TrustCor:</p>
</li>
<li>
<p>TrustCor RootCert CA-1</p>
</li>
<li>TrustCor RootCert CA-2</li>
<li>TrustCor ECA-1</li>
</ul>
<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">
<li class="list-group-item">
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
<br/>
<code>zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-4356=1</code>
</li>
<li class="list-group-item">
SUSE Linux Enterprise Server 11 SP4
<br/>
<code>zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-4356=1</code>
</li>
</ul>
<h2>Package List:</h2>
<ul>
<li>
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE (noarch)
<ul>
<li>openssl-certs-2.66-0.7.30.1</li>
</ul>
</li>
<li>
SUSE Linux Enterprise Server 11 SP4 (noarch)
<ul>
<li>openssl-certs-2.66-0.7.30.1</li>
</ul>
</li>
</ul>
<h2>References:</h2>
<ul>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206212">https://bugzilla.suse.com/show_bug.cgi?id=1206212</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1206622">https://bugzilla.suse.com/show_bug.cgi?id=1206622</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1214248">https://bugzilla.suse.com/show_bug.cgi?id=1214248</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220356">https://bugzilla.suse.com/show_bug.cgi?id=1220356</a>
</li>
<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1227525">https://bugzilla.suse.com/show_bug.cgi?id=1227525</a>
</li>
</ul>
</div>