SUSE-SU-2020:3466-1: moderate: Security update for SUSE Manager Server 4.0

sle-security-updates at sle-security-updates at
Fri Nov 20 10:15:03 MST 2020

   SUSE Security Update: Security update for SUSE Manager Server 4.0

Announcement ID:    SUSE-SU-2020:3466-1
Rating:             moderate
References:         #1144447 #1172079 #1173199 #1175739 #1175876 
                    #1175987 #1176074 #1176172 #1177336 #1177435 
                    #1177790 #1178060 #1178145 #1178195 
Cross-References:   CVE-2018-10936 CVE-2020-13692
Affected Products:
                    SUSE Linux Enterprise Module for SUSE Manager Server 4.0

   An update that solves two vulnerabilities and has 12 fixes
   is now available.


   This update fixes the following issues:


   - Temporarily disable dnssec-validation as hotfix for bsc#1177790
   - Update to version 0.1.1603299886.60e4bcf


   - Use variable for product name
   - Add support for system groups in Client Systems dashboard


   - Address CVE-2020-13692 (bsc#1172079)
   - Add patch:
   - Major changes since 9.4-1200:
     * License changed to BSD-2-Clause and BSD-3-Clause and Apache-2.0
     * Support PostgreSQL 9.5, 9.6, 10 11 and 12 added
     * Support for PostgreSQL versions below 8.2 was dropped
     * Support for JDK8, JDK9, JDK10, JDK11 and JDK12
     * Support for JDK 1.4 and 1.5 was dropped
     * Support for JDBC 4.2 added
     * Add maxResultBuffer property
     * Add caller push of binary data
     * Read only transactions
     * pkcs12 key functionality
     * New "escapeSyntaxCallMode" connection property
     * Connection property to limit server error detail in exception
     * CancelQuery() to PGConnection public interface
     * Support for large update counts (JDBC 4.2)
     * Add Binary Support for Oid.NUMERIC and Oid.NUMERIC_ARRAY
     * Expose parameter status messages (GUC_REPORT) to the user
     * Log ignoring rollback when no transaction in progress
     * Map inet type to InetAddress
     * Change ISGENERATED to ISGENERATEDCOLUMN as per spec
     * Support temporary replication slots in ReplicationCreateSlotBuilder
     * Return function (PostgreSQL 11) columns in
     * Return information on create replication slot, now the snapshot_name
       is exported to allow a consistent snapshot in some uses cases
     * `ssl=true` implies `sslmode=verify-full`, that is it requires valid
       server certificate
     * Support for `sslmode=allow/prefer/require`
     * Added server hostname verification for non-default SSL factories in
       `sslmode=verify-full` (CVE-2018-10936)
     * PreparedStatement.setNull(int parameterIndex, int t, String typeName)
       no longer ignores the typeName argument if it is not setNull
     * Reduce the severity of the error log messages when an exception is
       re-thrown. The error will be thrown to caller to be dealt with so no
       need to log at this verbosity by pgjdbc
     * Deprecate Fastpath API PR 903
     * Support parenthesis in {oj ...} JDBC escape syntax
     * socksProxyHost is ignored in case it contains empty string
     * Support SCRAM-SHA-256 for PostgreSQL 10 in the JDBC 4.2 version (Java
       8+) using the Ongres SCRAM library
     * Make SELECT INTO and CREATE TABLE AS return row counts to the client
       in their command tags
     * Support Subject Alternative Names for SSL connections
     * Support isAutoIncrement metadata for PostgreSQL 10 IDENTITY column
     * Support for primitive arrays PR 887 3e0491a
     * Implement support for get/setNetworkTimeout() in connections
     * Make GSS JAAS login optional, add an option "jaasLogin"
     * Improve behaviour of ResultSet.getObject(int, Class)
     * Parse CommandComplete message using a regular expression, allows
       complete catch of server returned commands for INSERT, UPDATE, DELETE,
       SELECT, FETCH, MOVE,COPY and future commands.
     * Use 'time with timezone' and 'timestamp with timezone' as is and
       ignore the user provided Calendars, 'time' and 'timestamp' work as
       earlier except "00:00:00" now maps to 1970-01-01 and "24:00:00" uses
       the system provided Calendar ignoring the user-provided one
     * Change behaviour of multihost connection. The new behaviour is to try
       all secondaries first before trying the master
     * Drop support for the (insecure) crypt authentication method
     * slave and preferSlave values for the targetServerType connection
       property have been deprecated in favour of secondary and
       preferSecondary respectively
     * Statements with non-zero fetchSize no longer require server-side named
       handle. This might cause issues when using old PostgreSQL versions
       (pre-8.4)+fetchSize+interleaved ResultSet processing combo
     * Better logic for returning keyword detection. Previously, pgjdbc could
       be defeated by column names that contain returning, so pgjdbc failed
       to "return generated keys" as it considered statement as already
       having returning keyword
     * Use server-prepared statements for batch inserts when
       prepareThreshold>0. This enables batch to use server-prepared from the
       first executeBatch() execution (previously it waited for
       prepareThreshold executeBatch() calls)
     * Replication protocol API was added: replication API documentation
     * java.util.logging is now used for logging: logging documentation
     * Add support for PreparedStatement.setCharacterStream(int, Reader)
     * Ensure executeBatch() can be used with pgbouncer. Previously pgjdbc
       could use server-prepared statements for batch execution even with
     * Error position is displayed when SQL has unterminated literals,
       comments, etc
     * Strict handling of accepted values in getBoolean and
       setObject(BOOLEAN), now it follows PostgreSQL accepted values, only 1
       and 0 for numeric types are acepted (previusly !=0 was true)
     * Deprecated PGPoolingDataSource, instead of this class you should use a
       fully featured connection pool like HikariCP, vibur-dbcp,
       commons-dbcp, c3p0, etc
     * 'current transaction is aborted' exception includes the original
       exception via caused-by chain
     * Better support for RETURNGENERATEDKEYS, statements with RETURNING
     * Avoid user-visible prepared-statement errors if client uses
       DEALLOCATE/DISCARD statements (invalidate cache when those statements
     * Avoid user-visible prepared-statement errors if client changes
       searchpath (invalidate cache when set searchpath detected)
     * Support comments when replacing {fn ...} JDBC syntax
     * Support for Types.REF_CURSOR
     * Performance optimization for timestamps (~TimeZone.getDefault
     * Ability to customize socket factory (e.g. for unix domain sockets)
     * Ignore empty sub-queries in composite queries
     * Add equality support to PSQLState
     * Improved composite/array type support and type naming changes.
   - Update to version 42.2.10

   - Update to version 42.2.9
   - Update to version 42.2.8
   - Update to version 42.2.7
   - Update to version 42.2.6
   - Update to version 42.2.5
   - Update to version 42.2.4
   - Update to version 42.2.3
   - Update to version 42.2.2
   - Update to version 42.2.1
   - Update to version 42.2.0
   - Update to version 42.1.4
   - Update to version 42.1.3
   - Update to version 42.1.2
   - Update to version 42.1.1
   - Update to version 42.1.0
   - Update to version 42.2.0
   - Update to version 9.4.1211

   - Update to version 9.4.1210

   - Update to version 9.4.1209

   - Update to version 9.4.1208

   - Update to version 9.4.1207

   - Update to version 9.4.1206

   - Update to version 9.4.1205

   - Update to version 9.4.1204

   - Update to version 9.4.1203

   - Update to version 9.4.1202

   - Update to version 9.4.1201


   - Fix empty directory values initialization
   - Disable reverse proxy on default


   - Update to version 0.2.3
   - Disable Alertmanager clustering (bsc#1178145)
   - Update to version 0.2.2
   - Use variable for product name


   - Version 0.18.0 See:


   - Use the license macro to mark the LICENSE in the package so that when
     installing without docs, it does install the LICENSE file
   - Prevent after upgrading from SUSE
     Manager 3.2 (bsc#1177435)


   - ISS: Differentiate packages with same nevra but different checksum in
     the same channel (bsc#1178195)
   - Fix unique machine_id detection (bsc#1176074)


   - Revert: Sync state modules when starting action chain execution
   - Sync state modules when starting action chain execution (bsc#1177336)
   - Fix repo url of AppStream in generated RHEL/Centos 8 kickstart file
   - Log token verify errors and check for expired tokens
   - Execute Salt SSH actions in parallel (bsc#1173199)
   - Take pool and volume from Salt virt.vm_info for files and blocks disks
   - Fix action chain resuming when patches updating salt-minion don't cause
     service to be restarted (bsc#1144447)
   - Renaming autoinstall distro didn't change the name of the Cobbler distro


   - Fix link to documentation in Admin -> Manager Configuration ->
     Monitoring (bsc#1176172)
   - Don't allow selecting spice for Xen PV and PVH guests


   - Add --force to mgr-create-bootstrap-repo to enforce generation even when
     some products are not synchronized


   - Execute Salt SSH actions in parallel (bsc#1173199)


   - Revert: Sync state modules when starting action chain execution
   - Sync state modules when starting action chain execution (bsc#1177336)
   - Fix grub2 autoinstall kernel path (bsc#1178060)
   - Move channel token information from sources.list to auth.conf on Debian
     10 and Ubuntu 18 and newer
   - Fix action chain resuming when patches updating salt-minion don't cause
     service to be restarted (bsc#1144447)
   - Make grub2 autoinstall kernel path relative to the boot partition root

   How to apply this update: 1. Log in as root user to the SUSE Manager
   server. 2. Stop the Spacewalk service: spacewalk-service stop 3. Apply the
   patch using either zypper patch or YaST Online Update. 4. Upgrade the
   database schema: spacewalk-schema-upgrade 5. Start the Spacewalk service:
   spacewalk-service start

Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for SUSE Manager Server 4.0:

      zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.0-2020-3466=1

Package List:

   - SUSE Linux Enterprise Module for SUSE Manager Server 4.0 (ppc64le s390x x86_64):


   - SUSE Linux Enterprise Module for SUSE Manager Server 4.0 (noarch):



More information about the sle-security-updates mailing list