Zimbra Releases/8.8.15/P41
Zimbra Collaboration Joule 8.8.15 Patch 41 GA Release
Release Date: July 26, 2023
Check out the Security Fixes, What's New, Fixed Issues, and Known Issues for this version of Zimbra Collaboration. Please refer to the Patch Installation steps for Patch Installation instructions. As always, you are encouraged to tell us what you think in the Forums or open a support ticket to report issues.
NOTE: If you are upgrading or migrating from an older version of Zimbra to Zimbra 8.8 Production Ready, please read Things to Know Before Upgrading and First Steps with the Zimbra NG Modules for critical information before you upgrade.
IMPORTANT: To install LDAP component standalone
The ZCS installer script has been updated to fix an issue related to deploying the certificate when installing the LDAP component. If you are planning to do a fresh install on a new server, please download the latest installer tar from the Zimbra Downloads page.
IMPORTANT: Zimbra OpenSSL with default FIPS Configuration
- Please be advised that, TLS 1.2 is the minimum supported version if FIPS is being used with OpenSSL 3.0. We recommend using Zimbra with strong TLS configuration for increased security. Please follow instructions in Cipher-suites-wiki to set correct ciphers as per current versions of openssl, nginx and postfix.
- From this patch going forward Zimbra OpenSSL will be configured to work with FIPS compliance enabled by default. You do not need to take any action, unless you run into issues, you can switch to the non-FIPS provider as follows:
- Run the below commands to Enable/Disable FIPS providers on all servers.
Disable FIPS provider:
As root user run below commands
Take backup of openssl.cnf cd /opt/zimbra/common/etc/ssl cp openssl.cnf <backup-path>/openssl.cnf
Copy openssl-source.cnf file cd /opt/zimbra/common/etc/ssl cp openssl-source.cnf openssl.cnf
Verify that, FIPS provider is disabled: Run below command and verify fips provider is not listed /opt/zimbra/common/bin/openssl list --providers
As zimbra user run below commands su - zimbra zmcontrol restart
Enable FIPS provider:
As root user run below commands
Take backup of openssl.cnf cd /opt/zimbra/common/etc/ssl cp openssl.cnf <backup-path>/openssl.cnf
Copy openssl-fips.cnf file cd /opt/zimbra/common/etc/ssl cp openssl-fips.cnf openssl.cnf
Verify that, FIPS provider is enabled: Run below command and verify fips provider is listed /opt/zimbra/common/bin/openssl list --providers
As zimbra user run below commands su - zimbra zmcontrol restart
Change in upgrade process for 8.8.15 Patch 41
Please note that the install process has changed. Additional steps to install zimbra-common-core-jar, zimbra-common-core-libs, zimbra-mbox-store-libs packages have been included for this patch release. Please refer to the Patch Installation steps to install the packages in its order.
Changes required for SSO setup before patch upgrade
Before upgrade, we need to set the zimbraVirtualHostName parameter for the domains that are using SAML and SSO based login. Please follow the instructions:
su - zimbra zmprov md domain_name zimbraVirtualHostName virtual_hostname
Security Fixes
Summary | CVE-ID | CVSS Score |
---|---|---|
OpenSSL package has been upgraded to fix a security issue related to the verification of X.509 certificate chains that include policy constraints | CVE-2023-0464 | TBD |
The Amavis package has been upgraded to 2.13.0 version. | TBD | TBD |
A cross-site scripting (XSS) vulnerability that was present in the in the Zimbra Classic Web Client has been addressed. | CVE-2023-37580 | TBD |
A bug that could lead to exposure of internal JSP and XML files has been fixed. | CVE-2023-38750 | TBD |
Note: Additional configuration for further hardening your Zimbra setup can be found on the Zimbra Support Portal. It is recommended that all customers consider these additional steps.
What's New
Package Upgrade
- The OpenSSL package has been upgraded from 1.1.1t to 3.0.9
- The Amavis package has been upgraded from 2.10.1 to 2.13.0
- The Clamav package has been upgraded from 0.105.2 to 1.0.1
- The Crypt::OpenSSL::RSA package has been upgraded from 0.31 to 0.33
- The IO::Socket::SSL package has been upgraded from 2.068 to 2.083
- The LWP::Protocol::https package has been upgraded from 6.06 to 6.10
- The Mail::DKIM package has been upgraded from 0.40 to 0.43
- The Net::SSLeay package has been upgraded from 1.88 to 1.92
- The Unbound package has been upgraded from 1.11 to 1.17.1
Zimbra Connector for Outlook
- The Zimbra Free Busy provider has been set as a default Free Busy provider. It will now display the correct status color for Busy, Tentative, and Out Of Office meetings. Earlier, it was set to Internet Free Busy provider.
Fixed Issues
Zimbra Collaboration
- The faulty X-Forwarded-For header which handles the IPv6 client logged an incorrect OIP field. The issue has been fixed. Please note the following requirements has to be fulfilled when adding the IPv6 IP address to the zimbraMailTrustedIP attribute:
- The IPv6 IP should be updated in the square bracket.
- The IPv6 IP should be in long format divided into 8 parts separated by a colon. See: https://wiki.zimbra.com/wiki/Configuring_for_IP_V6#Update_zimbraMailTrustedIP. ZBUG-2976
Zimbra Connector for Outlook
- In the Auto-Complete cache, a parsing problem was identified in a particular scenario. The full cache will now be parsed, and the user will be prompted to remove the bad cache.
- In case the ZCO registry keys are broken due to a Microsoft upgrade, the installer fixes such registry keys.
- Fixed an issue that results in Outlook crashing when sending the OneNote document as a PDF attachment.
- When the Free Busy provider is set to Internet Free Busy, the *Tentative* meeting status gets displayed as *Busy*. Changed the default Free Busy provider to Zimbra which also displays the correct status color for Busy, Tentative, and Out Of Office meetings.
Known Issues
- While deploying zimlets, if the following error is encountered, please refer to the [Installation] page to install the zimbra-common-core-jar, zimbra-common-core-libs, zimbra-mbox-store-libs packages in a particular order and re-deploy the zimlets.
/opt/zimbra/bin/zmjava: line 59: /bin/java: No such file or directory Exception in thread "main" java.lang.NoClassDefFoundError: org/apache/logging/log4j/core/appender/ConsoleAppender$Target at com.zimbra.cs.localconfig.LocalConfigCLI.main(LocalConfigCLI.java:353) Caused by: java.lang.ClassNotFoundException: org.apache.logging.log4j.core.appender.ConsoleAppender$Target at java.base/jdk.internal.loader.BuiltinClassLoader.loadClass(BuiltinClassLoader.java:602) at java.base/jdk.internal.loader.ClassLoaders$AppClassLoader.loadClass(ClassLoaders.java:178) at java.base/java.lang.ClassLoader.loadClass(ClassLoader.java:521) ... 1 more
- From Kepler-Patch-25 onwards, customers using SSO will need to update
zimbraVirtualHostName
attribute for the domains. Please refer to the instructions to update the attribute.
- With JDK 17, weaker Kerberos encryption types like 3DES and RC4 have now been disabled by default. This can cause SPNEGO auth to fail if described encryption types are being used. We recommend using stronger encryption types like AES256.
To get SPNEGO auth working with weak encryption types, weak encryption can be enabled by setting the allow_weak_crypto property to true in the krb5.conf configuration file. Please follow below instructions:
1. In /opt/zimbra/jetty_base/etc/krb5.ini.in -> [libdefaults] section, set allow_weak_crypto = true
2. Restart mailboxd service:
su - zimbra zmmailboxdctl restart
Packages
The package lineup for this release is:
FOSS:
PackageName -> Version zimbra-patch -> 8.8.15.1688898888.p41-1 zimbra-mta-patch -> 8.8.15.1688898888.p41-1 zimbra-proxy-patch -> 8.8.15.1688898888.p41-1 zimbra-ldap-patch -> 8.8.15.1688898888.p41-1 zimbra-common-core-jar -> 8.8.15.1688647408-1 zimbra-mbox-webclient-war -> 8.8.15.1688663419-1 zimbra-openssl -> 3.0.9-1zimbra8.8b1 zimbra-heimdal -> 1.5.3-1zimbra8.7b4 zimbra-perl-net-ssleay -> 1.92-1zimbra8.8b1 zimbra-curl -> 7.49.1-1zimbra8.7b4 zimbra-unbound -> 1.17.1-1zimbra8.8b1 zimbra-apr-util -> 1.6.1-1zimbra8.7b3 zimbra-perl-dbd-mysql -> 4.050-1zimbra8.7b5 zimbra-perl-crypt-openssl-random -> 0.11-1zimbra8.7b4 zimbra-perl-crypt-openssl-rsa -> 0.33-1zimbra8.8b1 zimbra-cyrus-sasl -> 2.1.28-1zimbra8.7b4 zimbra-openldap -> 2.4.59-1zimbra8.8b6 zimbra-postfix -> 3.6.1-1zimbra8.7b4 zimbra-opendkim -> 2.10.3-1zimbra8.7b6 zimbra-clamav -> 1.0.1-1zimbra8.8b4 zimbra-clamav-db -> 1.0.0-1zimbra8.7b2 zimbra-amavisd -> 2.13.0-1zimbra8.7b2 zimbra-net-snmp -> 5.8-1zimbra8.7b3 (For RHEL8,UBUNTU20 - 5.8-1zimbra8.7b4) zimbra-perl-io-socket-ssl -> 2.083-1zimbra8.7b3 (For RHEL8,UBUNTU20 - 2.083-1zimbra8.7b4) zimbra-perl-net-http -> 6.09-1zimbra8.7b4 (For RHEL8,UBUNTU20 - 6.09-1zimbra8.7b5) zimbra-perl-libwww -> 6.13-1zimbra8.7b4 (For RHEL8,UBUNTU20 - 6.13-1zimbra8.7b5) zimbra-perl-lwp-protocol-https -> 6.10-1zimbra8.7b3 (For RHEL8,UBUNTU20 - 6.10-1zimbra8.7b4) zimbra-perl-xml-parser -> 2.44-1zimbra8.7b4 (For RHEL8,UBUNTU20 - 2.44-1zimbra8.7b5) zimbra-perl-soap-lite -> 1.19-1zimbra8.7b4 (For RHEL8,UBUNTU20 - 1.19-1zimbra8.7b5) zimbra-perl-xml-sax-expat -> 0.51-1zimbra8.7b4 (For RHEL8,UBUNTU20 - 0.51-1zimbra8.7b5) zimbra-perl-xml-simple -> 2.25-1zimbra8.7b3 (For RHEL8,UBUNTU20 - 2.25-1zimbra8.7b4) zimbra-perl-mail-dkim -> 0.43-1zimbra8.8b1 zimbra-perl-mail-spamassassin -> 3.4.6-1zimbra8.8b4 (For RHEL8,UBUNTU20 - 3.4.6-1zimbra8.8b5) zimbra-spamassassin-rules -> 1.0.0-1zimbra8.8b6 (For RHEL8,UBUNTU20 - 1.0.0-1zimbra8.8b7) zimbra-perl-innotop -> 1.9.1-1zimbra8.7b4 (For RHEL8,UBUNTU20 - 1.9.1-1zimbra8.7b5) zimbra-httpd -> 2.4.57-1zimbra8.7b5 zimbra-perl-net-ldapapi -> 3.0.3-1zimbra8.7b2 zimbra-perl -> 1.0.8-1zimbra8.7b1 (For RHEL8,UBUNTU20 - 1.0.9-1zimbra8.7b1) zimbra-nginx -> 1.20.0-1zimbra8.8b4 zimbra-osl -> 1.0.10-1zimbra8.7b1 zimbra-core-components -> 2.0.24-1zimbra8.8b1 zimbra-ldap-components -> 1.0.24-1zimbra8.8b1 zimbra-proxy-components -> 1.0.11-1zimbra8.8b1 zimbra-mta-components -> 1.0.22-1zimbra8.8b1 zimbra-apache-components -> 2.0.11-1zimbra8.8b1 zimbra-dnscache-components -> 1.0.5-1zimbra8.7b1 zimbra-snmp-components -> 1.0.4-1zimbra8.7b1 (For RHEL8,UBUNTU20 - 1.0.5-1zimbra8.7b1) zimbra-spell-components -> 2.0.12-1zimbra8.8b1 (For RHEL8,UBUNTU20 - 2 .0.13-1zimbra8.8b1)
NETWORK:
PackageName -> Version zimbra-patch -> 8.8.15.1688898888.p41-2 zimbra-zco -> 8.8.15.1933.1688639704-1
Patch Installation
Please refer to below link to install Joule 8.8.15 Patch 41:
Quick note: Open Source repo
The steps to download, build, and see our code via Github can be found here: https://github.com/Zimbra/zm-build