Updated stunnel packages that fix one bug are now available for Red HatEnterprise Linux 6.

Stunnel is a wrapper for network connections. It can be used to tunnel anunencrypted network connection over an encrypted connection (encrypted using SSLor TLS) or to provide an encrypted means of connecting to services that do notnatively support encryption.This update fixes the following bug:* Previously, FIPS support was not enabled on Red Hat Enterprise Linux 6, andthe stunnel utility thus terminated unexpectedly with a segmentation fault whenin FIPS mode. This update fixes FIPS support in stunnel, and services thatoperate over stunnel now work as intended when in FIPS mode.Users of stunnel are advised to upgrade to these updated packages, which fixthis bug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
stunnel-4.29-3.el6_6.1.src.rpm
    MD5: 2d5f5dffd7b5a172ce657e1e406f5f04SHA-256: 064b45d2e83f6e534d9f6786cdfcc65f620f10c116eb997cf4cbf9d0aa0072fd
 
IA-32:
stunnel-4.29-3.el6_6.1.i686.rpm
    MD5: c22e46d6ff0ca89465ca752bf9d1dd3cSHA-256: a1ce299fe5882249b7d0aad24bb9fd4e40c6ec2837ad3ab6a9638a40f2b77249
stunnel-debuginfo-4.29-3.el6_6.1.i686.rpm
    MD5: dc130f31c64353af25a2b36f624ea6b9SHA-256: e4220331412ec29122830f6f51a0519dd65a8f401ccd2b5665d2988e42905190
 
x86_64:
stunnel-4.29-3.el6_6.1.x86_64.rpm
    MD5: a7855a7f8a2c9fbad0ac74f597b0263fSHA-256: 8c42705ebf933ae74ff43efce6c11c2c45f4265784fe73dc2da55aaa627bea13
stunnel-debuginfo-4.29-3.el6_6.1.x86_64.rpm
    MD5: 54c01f6f24f49b4fb40a0e188deeb0f6SHA-256: c45c53999d789364084ea257eba7c02539dfd35d616da3088480feea5a3a43e6
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
stunnel-4.29-3.el6_6.1.src.rpm
    MD5: 2d5f5dffd7b5a172ce657e1e406f5f04SHA-256: 064b45d2e83f6e534d9f6786cdfcc65f620f10c116eb997cf4cbf9d0aa0072fd
 
x86_64:
stunnel-4.29-3.el6_6.1.x86_64.rpm
    MD5: a7855a7f8a2c9fbad0ac74f597b0263fSHA-256: 8c42705ebf933ae74ff43efce6c11c2c45f4265784fe73dc2da55aaa627bea13
stunnel-debuginfo-4.29-3.el6_6.1.x86_64.rpm
    MD5: 54c01f6f24f49b4fb40a0e188deeb0f6SHA-256: c45c53999d789364084ea257eba7c02539dfd35d616da3088480feea5a3a43e6
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
stunnel-4.29-3.el6_6.1.src.rpm
    MD5: 2d5f5dffd7b5a172ce657e1e406f5f04SHA-256: 064b45d2e83f6e534d9f6786cdfcc65f620f10c116eb997cf4cbf9d0aa0072fd
 
IA-32:
stunnel-4.29-3.el6_6.1.i686.rpm
    MD5: c22e46d6ff0ca89465ca752bf9d1dd3cSHA-256: a1ce299fe5882249b7d0aad24bb9fd4e40c6ec2837ad3ab6a9638a40f2b77249
stunnel-debuginfo-4.29-3.el6_6.1.i686.rpm
    MD5: dc130f31c64353af25a2b36f624ea6b9SHA-256: e4220331412ec29122830f6f51a0519dd65a8f401ccd2b5665d2988e42905190
 
PPC:
stunnel-4.29-3.el6_6.1.ppc64.rpm
    MD5: 5f6bfd06818ee20a4345b9568e91edffSHA-256: 329e476cbc0a8e2402cde32554614314a111419130b456d5a843dea383ca20d5
stunnel-debuginfo-4.29-3.el6_6.1.ppc64.rpm
    MD5: bb7f2bea0ef859967ead9438696a0444SHA-256: fa12959f7ed4b71129cb4723070f5b6a989b2e58bce6504bdd0d6dc13825cbee
 
s390x:
stunnel-4.29-3.el6_6.1.s390x.rpm
    MD5: 218dff22e17bfdeb69e1f64e6c2862bdSHA-256: 9eef832d1ec250a0e57e23872ec2f8074098a59bd9f3dac926167eeefc39bf5e
stunnel-debuginfo-4.29-3.el6_6.1.s390x.rpm
    MD5: d81bc4964db0042153e52b68c98b1f71SHA-256: d2da78a4e3a7efaa640ffa5e576dee8352c3cbf5cc7418b909d6726776158c1b
 
x86_64:
stunnel-4.29-3.el6_6.1.x86_64.rpm
    MD5: a7855a7f8a2c9fbad0ac74f597b0263fSHA-256: 8c42705ebf933ae74ff43efce6c11c2c45f4265784fe73dc2da55aaa627bea13
stunnel-debuginfo-4.29-3.el6_6.1.x86_64.rpm
    MD5: 54c01f6f24f49b4fb40a0e188deeb0f6SHA-256: c45c53999d789364084ea257eba7c02539dfd35d616da3088480feea5a3a43e6
 
Red Hat Enterprise Linux Server EUS (v. 6.6.z)

SRPMS:
stunnel-4.29-3.el6_6.1.src.rpm
    MD5: 2d5f5dffd7b5a172ce657e1e406f5f04SHA-256: 064b45d2e83f6e534d9f6786cdfcc65f620f10c116eb997cf4cbf9d0aa0072fd
 
IA-32:
stunnel-4.29-3.el6_6.1.i686.rpm
    MD5: c22e46d6ff0ca89465ca752bf9d1dd3cSHA-256: a1ce299fe5882249b7d0aad24bb9fd4e40c6ec2837ad3ab6a9638a40f2b77249
stunnel-debuginfo-4.29-3.el6_6.1.i686.rpm
    MD5: dc130f31c64353af25a2b36f624ea6b9SHA-256: e4220331412ec29122830f6f51a0519dd65a8f401ccd2b5665d2988e42905190
 
PPC:
stunnel-4.29-3.el6_6.1.ppc64.rpm
    MD5: 5f6bfd06818ee20a4345b9568e91edffSHA-256: 329e476cbc0a8e2402cde32554614314a111419130b456d5a843dea383ca20d5
stunnel-debuginfo-4.29-3.el6_6.1.ppc64.rpm
    MD5: bb7f2bea0ef859967ead9438696a0444SHA-256: fa12959f7ed4b71129cb4723070f5b6a989b2e58bce6504bdd0d6dc13825cbee
 
s390x:
stunnel-4.29-3.el6_6.1.s390x.rpm
    MD5: 218dff22e17bfdeb69e1f64e6c2862bdSHA-256: 9eef832d1ec250a0e57e23872ec2f8074098a59bd9f3dac926167eeefc39bf5e
stunnel-debuginfo-4.29-3.el6_6.1.s390x.rpm
    MD5: d81bc4964db0042153e52b68c98b1f71SHA-256: d2da78a4e3a7efaa640ffa5e576dee8352c3cbf5cc7418b909d6726776158c1b
 
x86_64:
stunnel-4.29-3.el6_6.1.x86_64.rpm
    MD5: a7855a7f8a2c9fbad0ac74f597b0263fSHA-256: 8c42705ebf933ae74ff43efce6c11c2c45f4265784fe73dc2da55aaa627bea13
stunnel-debuginfo-4.29-3.el6_6.1.x86_64.rpm
    MD5: 54c01f6f24f49b4fb40a0e188deeb0f6SHA-256: c45c53999d789364084ea257eba7c02539dfd35d616da3088480feea5a3a43e6
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
stunnel-4.29-3.el6_6.1.src.rpm
    MD5: 2d5f5dffd7b5a172ce657e1e406f5f04SHA-256: 064b45d2e83f6e534d9f6786cdfcc65f620f10c116eb997cf4cbf9d0aa0072fd
 
IA-32:
stunnel-4.29-3.el6_6.1.i686.rpm
    MD5: c22e46d6ff0ca89465ca752bf9d1dd3cSHA-256: a1ce299fe5882249b7d0aad24bb9fd4e40c6ec2837ad3ab6a9638a40f2b77249
stunnel-debuginfo-4.29-3.el6_6.1.i686.rpm
    MD5: dc130f31c64353af25a2b36f624ea6b9SHA-256: e4220331412ec29122830f6f51a0519dd65a8f401ccd2b5665d2988e42905190
 
x86_64:
stunnel-4.29-3.el6_6.1.x86_64.rpm
    MD5: a7855a7f8a2c9fbad0ac74f597b0263fSHA-256: 8c42705ebf933ae74ff43efce6c11c2c45f4265784fe73dc2da55aaa627bea13
stunnel-debuginfo-4.29-3.el6_6.1.x86_64.rpm
    MD5: 54c01f6f24f49b4fb40a0e188deeb0f6SHA-256: c45c53999d789364084ea257eba7c02539dfd35d616da3088480feea5a3a43e6
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply