[CLSA-2024:1705941583] Update of ca-certificates
Type:
bugfix
Severity:
None
Release date:
2024-01-22 16:39:46 UTC
Description:
- Update to CKBI 2.64 from NSS 3.95 - Updated: - # Certificate "Autoridad de Certificacion Firmaprofesional CIF A62634068" - Removed: - # Certificate "E-Tugra Certification Authority" - # Certificate "Hongkong Post Root CA 1" - # Certificate "Symantec Class 1 Public Primary Certification Authority - G6" - # Certificate "Symantec Class 2 Public Primary Certification Authority - G6" - # Certificate "TrustCor ECA-1" - # Certificate "TrustCor RootCert CA-1" - # Certificate "TrustCor RootCert CA-2" - # Certificate "Verisign Class 1 Public Primary Certification Authority - G3" - # Certificate "Verisign Class 2 Public Primary Certification Authority - G3" - Added: - # Certificate "Atos TrustedRoot Root CA ECC G2 2020" - # Certificate "Atos TrustedRoot Root CA ECC TLS 2021" - # Certificate "Atos TrustedRoot Root CA RSA G2 2020" - # Certificate "Atos TrustedRoot Root CA RSA TLS 2021" - # Certificate "CommScope Public Trust ECC Root-01" - # Certificate "CommScope Public Trust ECC Root-02" - # Certificate "CommScope Public Trust RSA Root-01" - # Certificate "CommScope Public Trust RSA Root-02" - # Certificate "LAWtrust Root CA2 (4096)" - # Certificate "Sectigo Public Email Protection Root E46" - # Certificate "Sectigo Public Email Protection Root R46" - # Certificate "Sectigo Public Server Authentication Root E46" - # Certificate "Sectigo Public Server Authentication Root R46" - # Certificate "SSL.com Client ECC Root CA 2022" - # Certificate "SSL.com Client RSA Root CA 2022" - # Certificate "SSL.com TLS ECC Root CA 2022" - # Certificate "SSL.com TLS RSA Root CA 2022" - # Certificate "TrustAsia Global Root CA G3" - # Certificate "TrustAsia Global Root CA G4"
Updated packages:
  • ca-certificates-2023.2.64-80.0.el8_4.tuxcare.els1.noarch.rpm
    sha:151794bd9ec256cb365e084e783d267f7af4f713
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.