Patch Security Severity: Medium
Deployment Risk: Medium
This release focuses on essential security and improving user experience for the following editions
- Zimbra Daffodil 10.1.1 (Release Notes)
- Zimbra Daffodil 10.0.9 (Release Notes)
- Zimbra 9.0.0 Patch-41 (Release Notes)
Support, security patches, or updates for Zimbra 9.0.0 General Support will last through 12/31/2024
One-time fix for Zimbra 8.8.15
Zimbra 8.8.15 has reached the end of general support since last year. However, a one-time fix is delivered for a critical security issue that has a significant impact on many deployments that are still running in this version. It is recommended that you upgrade to the latest Zimbra Daffodil version.
Patch updated on Sep 04 include the following in their respective releases
What’s New
Beta features are not supported and should not be installed on production systems. Beta modules have been provided for evaluation in lab environments only.
RHEL 9, Rocky 9, Oracle 9 Support (Beta)
Available for 10.1.1. Watch for the GA announcement in an upcoming patch release.
Ubuntu 22 GA
Available for 10.1.1. Ubuntu 22 Pro subscription is required to enable FIPS mode.
Zimbra Collaboration
Hide Alias in GAL feature enables the admin to hide the alias for the users. Admin can control this through a CLI and Admin Console.
Modern Web App
New features that comply with usability guidelines and to improve mobile usability experience have been added. Users may now export and download emails as EML files, enjoy better calendar management, and access to more font type options.
And many more new features
Security Enhancements
Cross-Site Scripting (XSS)
Multiple issues addressed and resolved
Fixed Issues
- Zimbra Collaboration
- Modern Web App
- Classic Web App
- Admin Web Console
- Zimbra Connector for Outlook
#ICYMI (In-Case-You-Missed-It)
(1) Price Adjustments
Zimbra has introduced a price increase on all Zimbra offerings to take effect on Oct 1, 2024.
While Zimbra has maintained stable pricing for the last ten years, the inflation environment has made it harder to remain the same.
We are prioritizing innovative features in a more frequent release cadence. This aligns with our planned price increase in October, ensuring our partners and customers receive enhanced value in your investments.
Visit the Partner Portal to download the new price list. Customers are advised to contact your Zimbra representative for more details.
(2) New License for Zimbra Daffodil 10.1
It is mandatory to obtain a new license key to run the Zimbra Daffodil 10.1 software
You will not be able to proceed without a new Zimbra Daffodil V10.1 license key (including trial license)
Before installation, it is highly recommended to review the release notes and installer guides to ensure a smooth setup process –
Zimbra Chat and Video will be available in the coming weeks.
(3) ZCO Email Functionality
Upgrade to the latest Outlook version and enjoy seamless email sending through the latest ZCO build.
You may find the most recent ZCO package at https://www.zimbra.com/product/addons/zimbra-connector-for-outlook-download/
Refer to the release notes for the patch installation on Red Hat and Ubuntu platforms.
An upgrade to the latest patch for your version is highly recommended. Refer to our blog and the Zimbra Security Center for steps to ensure your system is safe.
This patch security severity is rated “medium”, yet there is one “critical security issue that has a significant impact on many deployments that are still running in this version”, that even warranted a patch release for Zimbra 8.8.15 past its EOL date?
Which one is the critical issue please, so we can focus on it?
Is it postjournal? As a mitigation, this file can simply be removed on most systems as it’s completely optional?
Hi Geert
The patch you mentioned does indeed address a critical vulnerability related to the postjournal binary. To mitigate this issue, Zimbra has already provided a patch for the postjournal binary. While the postjournal feature may be optional or not enabled on most systems, it is still necessary to apply the provided patch to prevent potential exploitation.
For Zimbra systems where the postjournal feature is not enabled and the patch cannot be applied immediately, removing the postjournal binary could be considered as a temporary measure until the patch can be applied.
We strongly recommend applying the provided patches to ensure proper mitigation of this vulnerability.
Ashish Kataria
Security Architect Engineer | Synacor