SUSE Security Update: Security update for ca-certificates-mozilla
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:4625-1
Rating:             important
References:         #1206212 #1206622 
Affected Products:
                    SUSE Linux Enterprise Server 12-SP2-BCL
                    SUSE Linux Enterprise Server 12-SP4-LTSS
                    SUSE Linux Enterprise Server 12-SP5
                    SUSE Linux Enterprise Server for SAP 12-SP4
                    SUSE OpenStack Cloud 9
                    SUSE OpenStack Cloud Crowbar 9
______________________________________________________________________________

   An update that contains security fixes can now be installed.

Description:

   This update for ca-certificates-mozilla fixes the following issues:

   - Updated to 2.60 state of Mozilla SSL root CAs (bsc#1206622) Removed CAs:
     - Global Chambersign Root
     - EC-ACC
     - Network Solutions Certificate Authority
     - Staat der Nederlanden EV Root CA
     - SwissSign Platinum CA - G2 Added CAs:
     - DIGITALSIGN GLOBAL ROOT ECDSA CA
     - DIGITALSIGN GLOBAL ROOT RSA CA
     - Security Communication ECC RootCA1
     - Security Communication RootCA3 Changed trust:
     - TrustCor certificates only trusted up to Nov 30 (bsc#1206212)

   - Removed CAs (bsc#1206212) as most code does not handle "valid before nov
     30 2022" and it is not clear how many certs were issued for SSL
     middleware by TrustCor:
     - TrustCor RootCert CA-1
     - TrustCor RootCert CA-2
     - TrustCor ECA-1


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE OpenStack Cloud Crowbar 9:

      zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2022-4625=1

   - SUSE OpenStack Cloud 9:

      zypper in -t patch SUSE-OpenStack-Cloud-9-2022-4625=1

   - SUSE Linux Enterprise Server for SAP 12-SP4:

      zypper in -t patch SUSE-SLE-SAP-12-SP4-2022-4625=1

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-4625=1

   - SUSE Linux Enterprise Server 12-SP4-LTSS:

      zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2022-4625=1

   - SUSE Linux Enterprise Server 12-SP2-BCL:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-4625=1



Package List:

   - SUSE OpenStack Cloud Crowbar 9 (noarch):

      ca-certificates-mozilla-2.60-12.40.1

   - SUSE OpenStack Cloud 9 (noarch):

      ca-certificates-mozilla-2.60-12.40.1

   - SUSE Linux Enterprise Server for SAP 12-SP4 (noarch):

      ca-certificates-mozilla-2.60-12.40.1

   - SUSE Linux Enterprise Server 12-SP5 (noarch):

      ca-certificates-mozilla-2.60-12.40.1

   - SUSE Linux Enterprise Server 12-SP4-LTSS (noarch):

      ca-certificates-mozilla-2.60-12.40.1

   - SUSE Linux Enterprise Server 12-SP2-BCL (noarch):

      ca-certificates-mozilla-2.60-12.40.1


References:

   https://bugzilla.suse.com/1206212
   https://bugzilla.suse.com/1206622

SUSE: 2022:4625-1 important: ca-certificates-mozilla

December 27, 2022
An update that contains security fixes can now be installed

Summary

This update for ca-certificates-mozilla fixes the following issues: - Updated to 2.60 state of Mozilla SSL root CAs (bsc#1206622) Removed CAs: - Global Chambersign Root - EC-ACC - Network Solutions Certificate Authority - Staat der Nederlanden EV Root CA - SwissSign Platinum CA - G2 Added CAs: - DIGITALSIGN GLOBAL ROOT ECDSA CA - DIGITALSIGN GLOBAL ROOT RSA CA - Security Communication ECC RootCA1 - Security Communication RootCA3 Changed trust: - TrustCor certificates only trusted up to Nov 30 (bsc#1206212) - Removed CAs (bsc#1206212) as most code does not handle "valid before nov 30 2022" and it is not clear how many certs were issued for SSL middleware by TrustCor: - TrustCor RootCert CA-1 - TrustCor RootCert CA-2 - TrustCor ECA-1 Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE OpenStack Cloud Crowbar 9: zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2022-4625=1 - SUSE OpenStack Cloud 9: zypper in -t patch SUSE-OpenStack-Cloud-9-2022-4625=1 - SUSE Linux Enterprise Server for SAP 12-SP4: zypper in -t patch SUSE-SLE-SAP-12-SP4-2022-4625=1 - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-4625=1 - SUSE Linux Enterprise Server 12-SP4-LTSS: zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2022-4625=1 - SUSE Linux Enterprise Server 12-SP2-BCL: zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-4625=1 Package List: - SUSE OpenStack Cloud Crowbar 9 (noarch): ca-certificates-mozilla-2.60-12.40.1 - SUSE OpenStack Cloud 9 (noarch): ca-certificates-mozilla-2.60-12.40.1 - SUSE Linux Enterprise Server for SAP 12-SP4 (noarch): ca-certificates-mozilla-2.60-12.40.1 - SUSE Linux Enterprise Server 12-SP5 (noarch): ca-certificates-mozilla-2.60-12.40.1 - SUSE Linux Enterprise Server 12-SP4-LTSS (noarch): ca-certificates-mozilla-2.60-12.40.1 - SUSE Linux Enterprise Server 12-SP2-BCL (noarch): ca-certificates-mozilla-2.60-12.40.1

References

#1206212 #1206622

Affected Products:

SUSE Linux Enterprise Server 12-SP2-BCL

SUSE Linux Enterprise Server 12-SP4-LTSS

SUSE Linux Enterprise Server 12-SP5

SUSE Linux Enterprise Server for SAP 12-SP4

SUSE OpenStack Cloud 9

SUSE OpenStack Cloud Crowbar 9

https://bugzilla.suse.com/1206212

https://bugzilla.suse.com/1206622

Severity
Announcement ID: SUSE-SU-2022:4625-1
Rating: important

Related News