OPENSUSE-SU-2022:0872-1

Vulnerability from csaf_opensuse - Published: 2022-03-16 09:35 - Updated: 2022-03-16 09:35
Summary
Security update for stunnel

Notes

Title of the patch
Security update for stunnel
Description of the patch
This update for stunnel fixes the following issues: Update to 5.62 including new features and bugfixes: * Security bugfixes - The 'redirect' option was fixed to properly handle unauthenticated requests (bsc#1182529). - Fixed a double free with OpenSSL older than 1.1.0. - Added hardening to systemd service (bsc#1181400). * New features - Added new 'protocol = capwin' and 'protocol = capwinctrl' configuration file options. - Added support for the new SSL_set_options() values. - Added a bash completion script. - New 'sessionResume' service-level option to allow or disallow session resumption - Download fresh ca-certs.pem for each new release. - New 'protocolHeader' service-level option to insert custom 'connect' protocol negotiation headers. This feature can be used to impersonate other software (e.g. web browsers). - 'protocolHost' can also be used to control the client SMTP protocol negotiation HELO/EHLO value. - Initial FIPS 3.0 support. - Client-side 'protocol = ldap' support * Bugfixes - Fixed a transfer() loop bug. - Fixed reloading configuration with 'systemctl reload stunnel.service'. - Fixed incorrect messages logged for OpenSSL errors. - Fixed 'redirect' with 'protocol'. This combination is not supported by 'smtp', 'pop3' and 'imap' protocols. - X.509v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificates. - Fixed a tiny memory leak in configuration file reload error handling. - Fixed engine initialization. - FIPS TLS feature is reported when a provider or container is available, and not when FIPS control API is available. - Fix configuration reload when compression is used - Fix test suite fixed not to require external connectivity
Patchnames
openSUSE-SLE-15.3-2022-872,openSUSE-SLE-15.4-2022-872
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for stunnel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for stunnel fixes the following issues:\n\nUpdate to 5.62 including new features and bugfixes:\n\n  * Security bugfixes\n    - The \u0027redirect\u0027 option was fixed to properly handle unauthenticated requests (bsc#1182529).\n    - Fixed a double free with OpenSSL older than 1.1.0.\n    - Added hardening to systemd service (bsc#1181400).\n  * New features\n    - Added new \u0027protocol = capwin\u0027 and \u0027protocol = capwinctrl\u0027 configuration file options.\n    - Added support for the new SSL_set_options() values.\n    - Added a bash completion script.\n    - New \u0027sessionResume\u0027 service-level option to allow or disallow session resumption\n    - Download fresh ca-certs.pem for each new release.\n    - New \u0027protocolHeader\u0027 service-level option to insert custom \u0027connect\u0027 protocol negotiation headers.\n      This feature can be used to impersonate other software (e.g. web browsers).\n    - \u0027protocolHost\u0027 can also be used to control the client SMTP protocol negotiation HELO/EHLO value.\n    - Initial FIPS 3.0 support.\n    - Client-side \u0027protocol = ldap\u0027 support\n  * Bugfixes\n    - Fixed a transfer() loop bug.\n    - Fixed reloading configuration with \u0027systemctl reload stunnel.service\u0027.\n    - Fixed incorrect messages logged for OpenSSL errors.\n    - Fixed \u0027redirect\u0027 with \u0027protocol\u0027.  This combination is not supported by \u0027smtp\u0027, \u0027pop3\u0027 and \u0027imap\u0027 protocols.\n    - X.509v3 extensions required by modern versions of OpenSSL are added to generated self-signed test certificates.\n    - Fixed a tiny memory leak in configuration file reload error handling.\n    - Fixed engine initialization.\n    - FIPS TLS feature is reported when a provider or container is available, and not when FIPS control API is available.\n    - Fix configuration reload when compression is used\n    - Fix test suite fixed not to require external connectivity\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-SLE-15.3-2022-872,openSUSE-SLE-15.4-2022-872",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0872-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2022:0872-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SF6GP7Y7QBDPSDEMYQPWKSOXKRHILQVP/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2022:0872-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SF6GP7Y7QBDPSDEMYQPWKSOXKRHILQVP/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1181400",
        "url": "https://bugzilla.suse.com/1181400"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1182529",
        "url": "https://bugzilla.suse.com/1182529"
      }
    ],
    "title": "Security update for stunnel",
    "tracking": {
      "current_release_date": "2022-03-16T09:35:18Z",
      "generator": {
        "date": "2022-03-16T09:35:18Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2022:0872-1",
      "initial_release_date": "2022-03-16T09:35:18Z",
      "revision_history": [
        {
          "date": "2022-03-16T09:35:18Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "stunnel-5.62-3.14.1.aarch64",
                "product": {
                  "name": "stunnel-5.62-3.14.1.aarch64",
                  "product_id": "stunnel-5.62-3.14.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "stunnel-doc-5.62-3.14.1.noarch",
                "product": {
                  "name": "stunnel-doc-5.62-3.14.1.noarch",
                  "product_id": "stunnel-doc-5.62-3.14.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "stunnel-5.62-3.14.1.ppc64le",
                "product": {
                  "name": "stunnel-5.62-3.14.1.ppc64le",
                  "product_id": "stunnel-5.62-3.14.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "stunnel-5.62-3.14.1.s390x",
                "product": {
                  "name": "stunnel-5.62-3.14.1.s390x",
                  "product_id": "stunnel-5.62-3.14.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "stunnel-5.62-3.14.1.x86_64",
                "product": {
                  "name": "stunnel-5.62-3.14.1.x86_64",
                  "product_id": "stunnel-5.62-3.14.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.3",
                "product": {
                  "name": "openSUSE Leap 15.3",
                  "product_id": "openSUSE Leap 15.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "stunnel-5.62-3.14.1.aarch64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:stunnel-5.62-3.14.1.aarch64"
        },
        "product_reference": "stunnel-5.62-3.14.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "stunnel-5.62-3.14.1.ppc64le as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:stunnel-5.62-3.14.1.ppc64le"
        },
        "product_reference": "stunnel-5.62-3.14.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "stunnel-5.62-3.14.1.s390x as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:stunnel-5.62-3.14.1.s390x"
        },
        "product_reference": "stunnel-5.62-3.14.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "stunnel-5.62-3.14.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:stunnel-5.62-3.14.1.x86_64"
        },
        "product_reference": "stunnel-5.62-3.14.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "stunnel-doc-5.62-3.14.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:stunnel-doc-5.62-3.14.1.noarch"
        },
        "product_reference": "stunnel-doc-5.62-3.14.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      }
    ]
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…