Security update for stunnel
Announcement ID: | SUSE-SU-2022:0872-1 |
---|---|
Rating: | important |
References: | |
Affected Products: |
|
An update that contains one feature and has two security fixes can now be installed.
Description:
This update for stunnel fixes the following issues:
Update to 5.62 including new features and bugfixes:
- Security bugfixes
- The "redirect" option was fixed to properly handle unauthenticated requests (bsc#1182529).
- Fixed a double free with OpenSSL older than 1.1.0.
- Added hardening to systemd service (bsc#1181400).
- New features
- Added new "protocol = capwin" and "protocol = capwinctrl" configuration file options.
- Added support for the new SSL_set_options() values.
- Added a bash completion script.
- New 'sessionResume' service-level option to allow or disallow session resumption
- Download fresh ca-certs.pem for each new release.
- New 'protocolHeader' service-level option to insert custom 'connect' protocol negotiation headers. This feature can be used to impersonate other software (e.g. web browsers).
- 'protocolHost' can also be used to control the client SMTP protocol negotiation HELO/EHLO value.
- Initial FIPS 3.0 support.
- Client-side "protocol = ldap" support
- Bugfixes
- Fixed a transfer() loop bug.
- Fixed reloading configuration with "systemctl reload stunnel.service".
- Fixed incorrect messages logged for OpenSSL errors.
- Fixed 'redirect' with 'protocol'. This combination is not supported by 'smtp', 'pop3' and 'imap' protocols.
- X.509v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificates.
- Fixed a tiny memory leak in configuration file reload error handling.
- Fixed engine initialization.
- FIPS TLS feature is reported when a provider or container is available, and not when FIPS control API is available.
- Fix configuration reload when compression is used
- Fix test suite fixed not to require external connectivity
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Server Applications Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-872=1
-
SUSE Linux Enterprise High Performance Computing 15 SP2 ESPOS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-872=1
-
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-872=1
-
SUSE Linux Enterprise Real Time 15 SP2
zypper in -t patch SUSE-SLE-Product-RT-15-SP2-2022-872=1
-
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-872=1
-
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-872=1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-872=1
-
SUSE Manager Proxy 4.1
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-872=1
-
SUSE Manager Retail Branch Server 4.1
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-872=1
-
SUSE Manager Server 4.1
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-872=1
-
SUSE Enterprise Storage 7
zypper in -t patch SUSE-Storage-7-2022-872=1
Package List:
-
Server Applications Module 15-SP3 (aarch64 ppc64le s390x x86_64)
- stunnel-debugsource-5.62-3.14.1
- stunnel-5.62-3.14.1
- stunnel-debuginfo-5.62-3.14.1
-
SUSE Linux Enterprise High Performance Computing 15 SP2 ESPOS 15-SP2 (aarch64 x86_64)
- stunnel-debugsource-5.62-3.14.1
- stunnel-5.62-3.14.1
- stunnel-debuginfo-5.62-3.14.1
-
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (aarch64 x86_64)
- stunnel-debugsource-5.62-3.14.1
- stunnel-5.62-3.14.1
- stunnel-debuginfo-5.62-3.14.1
-
SUSE Linux Enterprise Real Time 15 SP2 (x86_64)
- stunnel-debugsource-5.62-3.14.1
- stunnel-5.62-3.14.1
- stunnel-debuginfo-5.62-3.14.1
-
SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 (x86_64)
- stunnel-debugsource-5.62-3.14.1
- stunnel-5.62-3.14.1
- stunnel-debuginfo-5.62-3.14.1
-
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x x86_64)
- stunnel-debugsource-5.62-3.14.1
- stunnel-5.62-3.14.1
- stunnel-debuginfo-5.62-3.14.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
- stunnel-debugsource-5.62-3.14.1
- stunnel-5.62-3.14.1
- stunnel-debuginfo-5.62-3.14.1
-
SUSE Manager Proxy 4.1 (x86_64)
- stunnel-debugsource-5.62-3.14.1
- stunnel-5.62-3.14.1
- stunnel-debuginfo-5.62-3.14.1
-
SUSE Manager Retail Branch Server 4.1 (x86_64)
- stunnel-debugsource-5.62-3.14.1
- stunnel-5.62-3.14.1
- stunnel-debuginfo-5.62-3.14.1
-
SUSE Manager Server 4.1 (ppc64le s390x x86_64)
- stunnel-debugsource-5.62-3.14.1
- stunnel-5.62-3.14.1
- stunnel-debuginfo-5.62-3.14.1
-
SUSE Enterprise Storage 7 (aarch64 x86_64)
- stunnel-debugsource-5.62-3.14.1
- stunnel-5.62-3.14.1
- stunnel-debuginfo-5.62-3.14.1