SUSE 5146 Published by

A stunnel security update has been released for openSUSE Leap 15.3 and 15.4.



openSUSE-SU-2022:0872-1: important: Security update for stunnel


openSUSE Security Update: Security update for stunnel
______________________________________________________________________________

Announcement ID: openSUSE-SU-2022:0872-1
Rating: important
References: #1181400 #1182529 SLE-20679
Affected Products:
openSUSE Leap 15.3
openSUSE Leap 15.4
______________________________________________________________________________

An update that contains security fixes and contains one
feature can now be installed.

Description:

This update for stunnel fixes the following issues:

Update to 5.62 including new features and bugfixes:

* Security bugfixes
- The "redirect" option was fixed to properly handle unauthenticated
requests (bsc#1182529).
- Fixed a double free with OpenSSL older than 1.1.0.
- Added hardening to systemd service (bsc#1181400).
* New features
- Added new "protocol = capwin" and "protocol = capwinctrl"
configuration file options.
- Added support for the new SSL_set_options() values.
- Added a bash completion script.
- New 'sessionResume' service-level option to allow or disallow
session resumption
- Download fresh ca-certs.pem for each new release.
- New 'protocolHeader' service-level option to insert custom 'connect'
protocol negotiation headers. This feature can be used to
impersonate other software (e.g. web browsers).
- 'protocolHost' can also be used to control the client SMTP protocol
negotiation HELO/EHLO value.
- Initial FIPS 3.0 support.
- Client-side "protocol = ldap" support
* Bugfixes
- Fixed a transfer() loop bug.
- Fixed reloading configuration with "systemctl reload
stunnel.service".
- Fixed incorrect messages logged for OpenSSL errors.
- Fixed 'redirect' with 'protocol'. This combination is not supported
by 'smtp', 'pop3' and 'imap' protocols.
- X.509v3 extensions required by modern versions of OpenSSL are added
to generated self-signed test certificates.
- Fixed a tiny memory leak in configuration file reload error handling.
- Fixed engine initialization.
- FIPS TLS feature is reported when a provider or container is
available, and not when FIPS control API is available.
- Fix configuration reload when compression is used
- Fix test suite fixed not to require external connectivity

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Leap 15.4:

zypper in -t patch openSUSE-SLE-15.4-2022-872=1

- openSUSE Leap 15.3:

zypper in -t patch openSUSE-SLE-15.3-2022-872=1


Package List:

- openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):

stunnel-5.62-3.14.1
stunnel-debuginfo-5.62-3.14.1
stunnel-debugsource-5.62-3.14.1

- openSUSE Leap 15.4 (noarch):

stunnel-doc-5.62-3.14.1

- openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):

stunnel-5.62-3.14.1
stunnel-debuginfo-5.62-3.14.1
stunnel-debugsource-5.62-3.14.1

- openSUSE Leap 15.3 (noarch):

stunnel-doc-5.62-3.14.1

References:

  https://bugzilla.suse.com/1181400
  https://bugzilla.suse.com/1182529