openSUSE Security Update: Security update for stunnel______________________________________________________________________________Announcement ID: openSUSE-SU-2022:0872-1Rating: importantReferences: #1181400 #1182529 SLE-20679 Affected Products: openSUSE Leap 15.3 openSUSE Leap 15.4______________________________________________________________________________ An update that contains security fixes and contains one feature can now be installed.Description: This update for stunnel fixes the following issues: Update to 5.62 including new features and bugfixes: * Security bugfixes - The “redirect” option was fixed to properly handle unauthenticated requests (bsc#1182529). - Fixed a double free with OpenSSL older than 1.1.0. - Added hardening to systemd service (bsc#1181400). * New features - Added new “protocol = capwin” and “protocol = capwinctrl” configuration file options. - Added support for the new SSL_set_options() values. - Added a bash completion script. - New ‘sessionResume’ service-level option to allow or disallow session resumption - Download fresh ca-certs.pem for each new release. - New ‘protocolHeader’ service-level option to insert custom ‘connect’ protocol negotiation headers. This feature can be used to impersonate other software (e.g. web browsers). - ‘protocolHost’ can also be used to control the client SMTP protocol negotiation HELO/EHLO value. - Initial FIPS 3.0 support. - Client-side “protocol = ldap” support * Bugfixes - Fixed a transfer() loop bug. - Fixed reloading configuration with “systemctl reload stunnel.service”. - Fixed incorrect messages logged for OpenSSL errors. - Fixed ‘redirect’ with ‘protocol’. This combination is not supported by ‘smtp’, ‘pop3’ and ‘imap’ protocols. - X.509v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificates. - Fixed a tiny memory leak in configuration file reload error handling. - Fixed engine initialization. - FIPS TLS feature is reported when a provider or container is available, and not when FIPS control API is available. - Fix configuration reload when compression is used - Fix test suite fixed not to require external connectivityPatch Instructions: To install this openSUSE Security Update use the SUSE recommended installation methods like YaST online_update or “zypper patch”. Alternatively you can run the command listed for your product: - openSUSE Leap 15.4: zypper in -t patch openSUSE-SLE-15.4-2022-872=1 - openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-872=1Package List: - openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64): stunnel-5.62-3.14.1 stunnel-debuginfo-5.62-3.14.1 stunnel-debugsource-5.62-3.14.1 - openSUSE Leap 15.4 (noarch): stunnel-doc-5.62-3.14.1 - openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64): stunnel-5.62-3.14.1 stunnel-debuginfo-5.62-3.14.1 stunnel-debugsource-5.62-3.14.1 - openSUSE Leap 15.3 (noarch): stunnel-doc-5.62-3.14.1References: https://bugzilla.suse.com/1181400 https://bugzilla.suse.com/1182529