openSUSE Security Update: Security update for stunnel

Announcement ID:    openSUSE-SU-2022:0872-1
Rating:             important
References:         #1181400 #1182529 SLE-20679 
Affected Products:
                    openSUSE Leap 15.3
                    openSUSE Leap 15.4

   An update that contains security fixes and contains one
   feature can now be installed.


   This update for stunnel fixes the following issues:

   Update to 5.62 including new features and bugfixes:

     * Security bugfixes
       - The "redirect" option was fixed to properly handle unauthenticated
         requests (bsc#1182529).
       - Fixed a double free with OpenSSL older than 1.1.0.
       - Added hardening to systemd service (bsc#1181400).
     * New features
       - Added new "protocol = capwin" and "protocol = capwinctrl"
         configuration file options.
       - Added support for the new SSL_set_options() values.
       - Added a bash completion script.
       - New 'sessionResume' service-level option to allow or disallow
         session resumption
       - Download fresh ca-certs.pem for each new release.
       - New 'protocolHeader' service-level option to insert custom 'connect'
         protocol negotiation headers. This feature can be used to
         impersonate other software (e.g. web browsers).
       - 'protocolHost' can also be used to control the client SMTP protocol
         negotiation HELO/EHLO value.
       - Initial FIPS 3.0 support.
       - Client-side "protocol = ldap" support
     * Bugfixes
       - Fixed a transfer() loop bug.
       - Fixed reloading configuration with "systemctl reload
       - Fixed incorrect messages logged for OpenSSL errors.
       - Fixed 'redirect' with 'protocol'.  This combination is not supported
         by 'smtp', 'pop3' and 'imap' protocols.
       - X.509v3 extensions required by modern versions of OpenSSL are added
         to generated self-signed test certificates.
       - Fixed a tiny memory leak in configuration file reload error handling.
       - Fixed engine initialization.
       - FIPS TLS feature is reported when a provider or container is
         available, and not when FIPS control API is available.
       - Fix configuration reload when compression is used
       - Fix test suite fixed not to require external connectivity

Patch Instructions:

   To install this openSUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - openSUSE Leap 15.4:

      zypper in -t patch openSUSE-SLE-15.4-2022-872=1

   - openSUSE Leap 15.3:

      zypper in -t patch openSUSE-SLE-15.3-2022-872=1

Package List:

   - openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64):


   - openSUSE Leap 15.4 (noarch):


   - openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64):


   - openSUSE Leap 15.3 (noarch):