SUSE Security Update: Security update for stunnel
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:0872-1
Rating:             important
References:         #1181400 #1182529 SLE-20679 
Affected Products:
                    SUSE Enterprise Storage 7
                    SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
                    SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
                    SUSE Linux Enterprise High Performance Computing 15-SP3
                    SUSE Linux Enterprise High Performance Computing 15-SP4
                    SUSE Linux Enterprise Module for Server Applications 15-SP3
                    SUSE Linux Enterprise Module for Server Applications 15-SP4
                    SUSE Linux Enterprise Realtime Extension 15-SP2
                    SUSE Linux Enterprise Server 15-SP2-BCL
                    SUSE Linux Enterprise Server 15-SP2-LTSS
                    SUSE Linux Enterprise Server 15-SP3
                    SUSE Linux Enterprise Server 15-SP4
                    SUSE Linux Enterprise Server for SAP 15-SP2
                    SUSE Linux Enterprise Server for SAP Applications 15-SP3
                    SUSE Linux Enterprise Server for SAP Applications 15-SP4
                    SUSE Manager Proxy 4.1
                    SUSE Manager Proxy 4.2
                    SUSE Manager Retail Branch Server 4.1
                    SUSE Manager Server 4.1
                    SUSE Manager Server 4.2
______________________________________________________________________________

   An update that contains security fixes and contains one
   feature can now be installed.

Description:

   This update for stunnel fixes the following issues:

   Update to 5.62 including new features and bugfixes:

     * Security bugfixes
       - The "redirect" option was fixed to properly handle unauthenticated
         requests (bsc#1182529).
       - Fixed a double free with OpenSSL older than 1.1.0.
       - Added hardening to systemd service (bsc#1181400).
     * New features
       - Added new "protocol = capwin" and "protocol = capwinctrl"
         configuration file options.
       - Added support for the new SSL_set_options() values.
       - Added a bash completion script.
       - New 'sessionResume' service-level option to allow or disallow
         session resumption
       - Download fresh ca-certs.pem for each new release.
       - New 'protocolHeader' service-level option to insert custom 'connect'
         protocol negotiation headers. This feature can be used to
         impersonate other software (e.g. web browsers).
       - 'protocolHost' can also be used to control the client SMTP protocol
         negotiation HELO/EHLO value.
       - Initial FIPS 3.0 support.
       - Client-side "protocol = ldap" support
     * Bugfixes
       - Fixed a transfer() loop bug.
       - Fixed reloading configuration with "systemctl reload
         stunnel.service".
       - Fixed incorrect messages logged for OpenSSL errors.
       - Fixed 'redirect' with 'protocol'.  This combination is not supported
         by 'smtp', 'pop3' and 'imap' protocols.
       - X.509v3 extensions required by modern versions of OpenSSL are added
         to generated self-signed test certificates.
       - Fixed a tiny memory leak in configuration file reload error handling.
       - Fixed engine initialization.
       - FIPS TLS feature is reported when a provider or container is
         available, and not when FIPS control API is available.
       - Fix configuration reload when compression is used
       - Fix test suite fixed not to require external connectivity


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Manager Server 4.1:

      zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-872=1

   - SUSE Manager Retail Branch Server 4.1:

      zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-872=1

   - SUSE Manager Proxy 4.1:

      zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-872=1

   - SUSE Linux Enterprise Server for SAP 15-SP2:

      zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-872=1

   - SUSE Linux Enterprise Server 15-SP2-LTSS:

      zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-872=1

   - SUSE Linux Enterprise Server 15-SP2-BCL:

      zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-872=1

   - SUSE Linux Enterprise Realtime Extension 15-SP2:

      zypper in -t patch SUSE-SLE-Product-RT-15-SP2-2022-872=1

   - SUSE Linux Enterprise Module for Server Applications 15-SP4:

      zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-872=1

   - SUSE Linux Enterprise Module for Server Applications 15-SP3:

      zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-872=1

   - SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:

      zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-872=1

   - SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:

      zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-872=1

   - SUSE Enterprise Storage 7:

      zypper in -t patch SUSE-Storage-7-2022-872=1



Package List:

   - SUSE Manager Server 4.1 (ppc64le s390x x86_64):

      stunnel-5.62-3.14.1
      stunnel-debuginfo-5.62-3.14.1
      stunnel-debugsource-5.62-3.14.1

   - SUSE Manager Retail Branch Server 4.1 (x86_64):

      stunnel-5.62-3.14.1
      stunnel-debuginfo-5.62-3.14.1
      stunnel-debugsource-5.62-3.14.1

   - SUSE Manager Proxy 4.1 (x86_64):

      stunnel-5.62-3.14.1
      stunnel-debuginfo-5.62-3.14.1
      stunnel-debugsource-5.62-3.14.1

   - SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):

      stunnel-5.62-3.14.1
      stunnel-debuginfo-5.62-3.14.1
      stunnel-debugsource-5.62-3.14.1

   - SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):

      stunnel-5.62-3.14.1
      stunnel-debuginfo-5.62-3.14.1
      stunnel-debugsource-5.62-3.14.1

   - SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):

      stunnel-5.62-3.14.1
      stunnel-debuginfo-5.62-3.14.1
      stunnel-debugsource-5.62-3.14.1

   - SUSE Linux Enterprise Realtime Extension 15-SP2 (x86_64):

      stunnel-5.62-3.14.1
      stunnel-debuginfo-5.62-3.14.1
      stunnel-debugsource-5.62-3.14.1

   - SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le s390x x86_64):

      stunnel-5.62-3.14.1
      stunnel-debuginfo-5.62-3.14.1
      stunnel-debugsource-5.62-3.14.1

   - SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le s390x x86_64):

      stunnel-5.62-3.14.1
      stunnel-debuginfo-5.62-3.14.1
      stunnel-debugsource-5.62-3.14.1

   - SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):

      stunnel-5.62-3.14.1
      stunnel-debuginfo-5.62-3.14.1
      stunnel-debugsource-5.62-3.14.1

   - SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):

      stunnel-5.62-3.14.1
      stunnel-debuginfo-5.62-3.14.1
      stunnel-debugsource-5.62-3.14.1

   - SUSE Enterprise Storage 7 (aarch64 x86_64):

      stunnel-5.62-3.14.1
      stunnel-debuginfo-5.62-3.14.1
      stunnel-debugsource-5.62-3.14.1


References:

   https://bugzilla.suse.com/1181400
   https://bugzilla.suse.com/1182529

SUSE: 2022:0872-1 important: stunnel

March 16, 2022
An update that contains security fixes and contains one feature can now be installed

Summary

This update for stunnel fixes the following issues: Update to 5.62 including new features and bugfixes: * Security bugfixes - The "redirect" option was fixed to properly handle unauthenticated requests (bsc#1182529). - Fixed a double free with OpenSSL older than 1.1.0. - Added hardening to systemd service (bsc#1181400). * New features - Added new "protocol = capwin" and "protocol = capwinctrl" configuration file options. - Added support for the new SSL_set_options() values. - Added a bash completion script. - New 'sessionResume' service-level option to allow or disallow session resumption - Download fresh ca-certs.pem for each new release. - New 'protocolHeader' service-level option to insert custom 'connect' protocol negotiation headers. This feature can be used to impersonate other software (e.g. web browsers). - 'protocolHost' can also be used to control the client SMTP protocol negotiation HELO/EHLO value. - Initial FIPS 3.0 support. - Client-side "protocol = ldap" support * Bugfixes - Fixed a transfer() loop bug. - Fixed reloading configuration with "systemctl reload stunnel.service". - Fixed incorrect messages logged for OpenSSL errors. - Fixed 'redirect' with 'protocol'. This combination is not supported by 'smtp', 'pop3' and 'imap' protocols. - X.509v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificates. - Fixed a tiny memory leak in configuration file reload error handling. - Fixed engine initialization. - FIPS TLS feature is reported when a provider or container is available, and not when FIPS control API is available. - Fix configuration reload when compression is used - Fix test suite fixed not to require external connectivity Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Manager Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-872=1 - SUSE Manager Retail Branch Server 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-872=1 - SUSE Manager Proxy 4.1: zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-872=1 - SUSE Linux Enterprise Server for SAP 15-SP2: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-872=1 - SUSE Linux Enterprise Server 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-872=1 - SUSE Linux Enterprise Server 15-SP2-BCL: zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-872=1 - SUSE Linux Enterprise Realtime Extension 15-SP2: zypper in -t patch SUSE-SLE-Product-RT-15-SP2-2022-872=1 - SUSE Linux Enterprise Module for Server Applications 15-SP4: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2022-872=1 - SUSE Linux Enterprise Module for Server Applications 15-SP3: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-872=1 - SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-872=1 - SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-872=1 - SUSE Enterprise Storage 7: zypper in -t patch SUSE-Storage-7-2022-872=1 Package List: - SUSE Manager Server 4.1 (ppc64le s390x x86_64): stunnel-5.62-3.14.1 stunnel-debuginfo-5.62-3.14.1 stunnel-debugsource-5.62-3.14.1 - SUSE Manager Retail Branch Server 4.1 (x86_64): stunnel-5.62-3.14.1 stunnel-debuginfo-5.62-3.14.1 stunnel-debugsource-5.62-3.14.1 - SUSE Manager Proxy 4.1 (x86_64): stunnel-5.62-3.14.1 stunnel-debuginfo-5.62-3.14.1 stunnel-debugsource-5.62-3.14.1 - SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64): stunnel-5.62-3.14.1 stunnel-debuginfo-5.62-3.14.1 stunnel-debugsource-5.62-3.14.1 - SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64): stunnel-5.62-3.14.1 stunnel-debuginfo-5.62-3.14.1 stunnel-debugsource-5.62-3.14.1 - SUSE Linux Enterprise Server 15-SP2-BCL (x86_64): stunnel-5.62-3.14.1 stunnel-debuginfo-5.62-3.14.1 stunnel-debugsource-5.62-3.14.1 - SUSE Linux Enterprise Realtime Extension 15-SP2 (x86_64): stunnel-5.62-3.14.1 stunnel-debuginfo-5.62-3.14.1 stunnel-debugsource-5.62-3.14.1 - SUSE Linux Enterprise Module for Server Applications 15-SP4 (aarch64 ppc64le s390x x86_64): stunnel-5.62-3.14.1 stunnel-debuginfo-5.62-3.14.1 stunnel-debugsource-5.62-3.14.1 - SUSE Linux Enterprise Module for Server Applications 15-SP3 (aarch64 ppc64le s390x x86_64): stunnel-5.62-3.14.1 stunnel-debuginfo-5.62-3.14.1 stunnel-debugsource-5.62-3.14.1 - SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64): stunnel-5.62-3.14.1 stunnel-debuginfo-5.62-3.14.1 stunnel-debugsource-5.62-3.14.1 - SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64): stunnel-5.62-3.14.1 stunnel-debuginfo-5.62-3.14.1 stunnel-debugsource-5.62-3.14.1 - SUSE Enterprise Storage 7 (aarch64 x86_64): stunnel-5.62-3.14.1 stunnel-debuginfo-5.62-3.14.1 stunnel-debugsource-5.62-3.14.1

References

#1181400 #1182529 SLE-20679

Affected Products:

SUSE Enterprise Storage 7

SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS

SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS

SUSE Linux Enterprise High Performance Computing 15-SP3

SUSE Linux Enterprise High Performance Computing 15-SP4

SUSE Linux Enterprise Module for Server Applications 15-SP3

SUSE Linux Enterprise Module for Server Applications 15-SP4

SUSE Linux Enterprise Realtime Extension 15-SP2

SUSE Linux Enterprise Server 15-SP2-BCL

SUSE Linux Enterprise Server 15-SP2-LTSS

SUSE Linux Enterprise Server 15-SP3

SUSE Linux Enterprise Server 15-SP4

SUSE Linux Enterprise Server for SAP 15-SP2

SUSE Linux Enterprise Server for SAP Applications 15-SP3

SUSE Linux Enterprise Server for SAP Applications 15-SP4

SUSE Manager Proxy 4.1

SUSE Manager Proxy 4.2

SUSE Manager Retail Branch Server 4.1

SUSE Manager Server 4.1

SUSE Manager Server 4.2

https://bugzilla.suse.com/1181400

https://bugzilla.suse.com/1182529

Severity
Announcement ID: SUSE-SU-2022:0872-1
Rating: important

Related News