Zimbra Releases/8.8.15/P41

Zimbra Collaboration Joule 8.8.15 Patch 41 GA Release

Release Date: July 26, 2023

Check out the Security Fixes, What's New, Fixed Issues, and Known Issues for this version of Zimbra Collaboration. Please refer to the Patch Installation steps for Patch Installation instructions. As always, you are encouraged to tell us what you think in the Forums or open a support ticket to report issues.

NOTE: If you are upgrading or migrating from an older version of Zimbra to Zimbra 8.8 Production Ready, please read Things to Know Before Upgrading and First Steps with the Zimbra NG Modules for critical information before you upgrade.


IMPORTANT: To install LDAP component standalone

The ZCS installer script has been updated to fix an issue related to deploying the certificate when installing the LDAP component. If you are planning to do a fresh install on a new server, please download the latest installer tar from the Zimbra Downloads page.

IMPORTANT: Zimbra OpenSSL with default FIPS Configuration

  • Please be advised that, TLS 1.2 is the minimum supported version if FIPS is being used with OpenSSL 3.0. We recommend using Zimbra with strong TLS configuration for increased security. Please follow instructions in Cipher-suites-wiki to set correct ciphers as per current versions of openssl, nginx and postfix.
  • From this patch going forward Zimbra OpenSSL will be configured to work with FIPS compliance enabled by default. You do not need to take any action, unless you run into issues, you can switch to the non-FIPS provider as follows:
  • Run the below commands to Enable/Disable FIPS providers on all servers.

Disable FIPS provider:

As root user run below commands
Take backup of openssl.cnf cd /opt/zimbra/common/etc/ssl cp openssl.cnf <backup-path>/openssl.cnf
Copy openssl-source.cnf file cd /opt/zimbra/common/etc/ssl cp openssl-source.cnf openssl.cnf
Verify that, FIPS provider is disabled: Run below command and verify fips provider is not listed /opt/zimbra/common/bin/openssl list --providers
As zimbra user run below commands su - zimbra zmcontrol restart

Enable FIPS provider:

As root user run below commands
Take backup of openssl.cnf cd /opt/zimbra/common/etc/ssl cp openssl.cnf <backup-path>/openssl.cnf
Copy openssl-fips.cnf file cd /opt/zimbra/common/etc/ssl cp openssl-fips.cnf openssl.cnf
Verify that, FIPS provider is enabled: Run below command and verify fips provider is listed /opt/zimbra/common/bin/openssl list --providers
As zimbra user run below commands su - zimbra zmcontrol restart

Change in upgrade process for 8.8.15 Patch 41

Please note that the install process has changed. Additional steps to install zimbra-common-core-jar, zimbra-common-core-libs, zimbra-mbox-store-libs packages have been included for this patch release. Please refer to the Patch Installation steps to install the packages in its order.


Changes required for SSO setup before patch upgrade

Before upgrade, we need to set the zimbraVirtualHostName parameter for the domains that are using SAML and SSO based login. Please follow the instructions:

su - zimbra
zmprov md domain_name zimbraVirtualHostName virtual_hostname

Security Fixes

Summary CVE-ID CVSS Score
OpenSSL package has been upgraded to fix a security issue related to the verification of X.509 certificate chains that include policy constraints CVE-2023-0464 TBD
The Amavis package has been upgraded to 2.13.0 version. TBD TBD
A cross-site scripting (XSS) vulnerability that was present in the in the Zimbra Classic Web Client has been addressed. CVE-2023-37580 TBD
A bug that could lead to exposure of internal JSP and XML files has been fixed. CVE-2023-38750 TBD

Note: Additional configuration for further hardening your Zimbra setup can be found on the Zimbra Support Portal. It is recommended that all customers consider these additional steps.


What's New

Package Upgrade

  • The OpenSSL package has been upgraded from 1.1.1t to 3.0.9
  • The Amavis package has been upgraded from 2.10.1 to 2.13.0
  • The Clamav package has been upgraded from 0.105.2 to 1.0.1
  • The Crypt::OpenSSL::RSA package has been upgraded from 0.31 to 0.33
  • The IO::Socket::SSL package has been upgraded from 2.068 to 2.083
  • The LWP::Protocol::https package has been upgraded from 6.06 to 6.10
  • The Mail::DKIM package has been upgraded from 0.40 to 0.43
  • The Net::SSLeay package has been upgraded from 1.88 to 1.92
  • The Unbound package has been upgraded from 1.11 to 1.17.1

Zimbra Connector for Outlook

  • The Zimbra Free Busy provider has been set as a default Free Busy provider. It will now display the correct status color for Busy, Tentative, and Out Of Office meetings. Earlier, it was set to Internet Free Busy provider.


Fixed Issues

Zimbra Collaboration

  • The faulty X-Forwarded-For header which handles the IPv6 client logged an incorrect OIP field. The issue has been fixed. Please note the following requirements has to be fulfilled when adding the IPv6 IP address to the zimbraMailTrustedIP attribute:

Zimbra Connector for Outlook

  • In the Auto-Complete cache, a parsing problem was identified in a particular scenario. The full cache will now be parsed, and the user will be prompted to remove the bad cache.
  • In case the ZCO registry keys are broken due to a Microsoft upgrade, the installer fixes such registry keys.
  • Fixed an issue that results in Outlook crashing when sending the OneNote document as a PDF attachment.
  • When the Free Busy provider is set to Internet Free Busy, the *Tentative* meeting status gets displayed as *Busy*. Changed the default Free Busy provider to Zimbra which also displays the correct status color for Busy, Tentative, and Out Of Office meetings.


Known Issues

  • While deploying zimlets, if the following error is encountered, please refer to the [Installation] page to install the zimbra-common-core-jar, zimbra-common-core-libs, zimbra-mbox-store-libs packages in a particular order and re-deploy the zimlets.
/opt/zimbra/bin/zmjava: line 59: /bin/java: No such file or directory
Exception in thread "main" java.lang.NoClassDefFoundError: org/apache/logging/log4j/core/appender/ConsoleAppender$Target
       at com.zimbra.cs.localconfig.LocalConfigCLI.main(LocalConfigCLI.java:353)
Caused by: java.lang.ClassNotFoundException: org.apache.logging.log4j.core.appender.ConsoleAppender$Target
       at java.base/jdk.internal.loader.BuiltinClassLoader.loadClass(BuiltinClassLoader.java:602)
       at java.base/jdk.internal.loader.ClassLoaders$AppClassLoader.loadClass(ClassLoaders.java:178)
       at java.base/java.lang.ClassLoader.loadClass(ClassLoader.java:521)
       ... 1 more
  • From Kepler-Patch-25 onwards, customers using SSO will need to update zimbraVirtualHostName attribute for the domains. Please refer to the instructions to update the attribute.
  • With JDK 17, weaker Kerberos encryption types like 3DES and RC4 have now been disabled by default. This can cause SPNEGO auth to fail if described encryption types are being used. We recommend using stronger encryption types like AES256.

To get SPNEGO auth working with weak encryption types, weak encryption can be enabled by setting the allow_weak_crypto property to true in the krb5.conf configuration file. Please follow below instructions:

1. In /opt/zimbra/jetty_base/etc/krb5.ini.in -> [libdefaults] section, set allow_weak_crypto = true

2. Restart mailboxd service:

su - zimbra
zmmailboxdctl restart

Packages

The package lineup for this release is:

FOSS:

PackageName                                       -> Version
zimbra-patch                                      ->  8.8.15.1688898888.p41-1
zimbra-mta-patch                                  ->  8.8.15.1688898888.p41-1
zimbra-proxy-patch                                ->  8.8.15.1688898888.p41-1
zimbra-ldap-patch                                 ->  8.8.15.1688898888.p41-1
zimbra-common-core-jar                            ->  8.8.15.1688647408-1
zimbra-mbox-webclient-war                         ->  8.8.15.1688663419-1
zimbra-openssl                                    ->  3.0.9-1zimbra8.8b1
zimbra-heimdal                                    ->  1.5.3-1zimbra8.7b4
zimbra-perl-net-ssleay                            ->  1.92-1zimbra8.8b1
zimbra-curl                                       ->  7.49.1-1zimbra8.7b4
zimbra-unbound                                    ->  1.17.1-1zimbra8.8b1
zimbra-apr-util                                   ->  1.6.1-1zimbra8.7b3
zimbra-perl-dbd-mysql                             ->  4.050-1zimbra8.7b5
zimbra-perl-crypt-openssl-random                  ->  0.11-1zimbra8.7b4
zimbra-perl-crypt-openssl-rsa                     ->  0.33-1zimbra8.8b1
zimbra-cyrus-sasl                                 ->  2.1.28-1zimbra8.7b4
zimbra-openldap                                   ->  2.4.59-1zimbra8.8b6
zimbra-postfix                                    ->  3.6.1-1zimbra8.7b4
zimbra-opendkim                                   ->  2.10.3-1zimbra8.7b6
zimbra-clamav                                     ->  1.0.1-1zimbra8.8b4
zimbra-clamav-db                                  ->  1.0.0-1zimbra8.7b2
zimbra-amavisd                                    ->  2.13.0-1zimbra8.7b2
zimbra-net-snmp                                   ->  5.8-1zimbra8.7b3 (For RHEL8,UBUNTU20 - 5.8-1zimbra8.7b4)
zimbra-perl-io-socket-ssl                         ->  2.083-1zimbra8.7b3 (For RHEL8,UBUNTU20 - 2.083-1zimbra8.7b4)
zimbra-perl-net-http                              ->  6.09-1zimbra8.7b4 (For RHEL8,UBUNTU20 - 6.09-1zimbra8.7b5)
zimbra-perl-libwww                                ->  6.13-1zimbra8.7b4 (For RHEL8,UBUNTU20 - 6.13-1zimbra8.7b5)
zimbra-perl-lwp-protocol-https                    ->  6.10-1zimbra8.7b3 (For RHEL8,UBUNTU20 - 6.10-1zimbra8.7b4)
zimbra-perl-xml-parser                            ->  2.44-1zimbra8.7b4 (For RHEL8,UBUNTU20 - 2.44-1zimbra8.7b5)
zimbra-perl-soap-lite                             ->  1.19-1zimbra8.7b4 (For RHEL8,UBUNTU20 - 1.19-1zimbra8.7b5)
zimbra-perl-xml-sax-expat                         ->  0.51-1zimbra8.7b4 (For RHEL8,UBUNTU20 - 0.51-1zimbra8.7b5)
zimbra-perl-xml-simple                            ->  2.25-1zimbra8.7b3 (For RHEL8,UBUNTU20 - 2.25-1zimbra8.7b4)
zimbra-perl-mail-dkim                             ->  0.43-1zimbra8.8b1
zimbra-perl-mail-spamassassin                     ->  3.4.6-1zimbra8.8b4 (For RHEL8,UBUNTU20 - 3.4.6-1zimbra8.8b5)
zimbra-spamassassin-rules                         ->  1.0.0-1zimbra8.8b6 (For RHEL8,UBUNTU20 - 1.0.0-1zimbra8.8b7)
zimbra-perl-innotop                               ->  1.9.1-1zimbra8.7b4 (For RHEL8,UBUNTU20 - 1.9.1-1zimbra8.7b5)
zimbra-httpd                                      ->  2.4.57-1zimbra8.7b5
zimbra-perl-net-ldapapi                           ->  3.0.3-1zimbra8.7b2
zimbra-perl                                       ->  1.0.8-1zimbra8.7b1 (For RHEL8,UBUNTU20 - 1.0.9-1zimbra8.7b1)
zimbra-nginx                                      ->  1.20.0-1zimbra8.8b4
zimbra-osl                                        ->  1.0.10-1zimbra8.7b1
zimbra-core-components                            ->  2.0.24-1zimbra8.8b1
zimbra-ldap-components                            ->  1.0.24-1zimbra8.8b1
zimbra-proxy-components                           ->  1.0.11-1zimbra8.8b1
zimbra-mta-components                             ->  1.0.22-1zimbra8.8b1
zimbra-apache-components                          ->  2.0.11-1zimbra8.8b1
zimbra-dnscache-components                        ->  1.0.5-1zimbra8.7b1
zimbra-snmp-components                            ->  1.0.4-1zimbra8.7b1 (For RHEL8,UBUNTU20 - 1.0.5-1zimbra8.7b1)
zimbra-spell-components                           ->  2.0.12-1zimbra8.8b1 (For RHEL8,UBUNTU20 - 2 .0.13-1zimbra8.8b1)

NETWORK:

PackageName                                       -> Version
zimbra-patch                                      ->  8.8.15.1688898888.p41-2
zimbra-zco                                        ->  8.8.15.1933.1688639704-1


Patch Installation

Please refer to below link to install Joule 8.8.15 Patch 41:

Patch Installation

Quick note: Open Source repo

The steps to download, build, and see our code via Github can be found here: https://github.com/Zimbra/zm-build

Jump to: navigation, search