SUSE-SU-2022:0798-1: moderate: Security update for SUSE Manager Server 4.1
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Thu Mar 10 14:28:50 UTC 2022
SUSE Security Update: Security update for SUSE Manager Server 4.1
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:0798-1
Rating: moderate
References: #1097531 #1133198 #1190781 #1191360 #1192510
#1192566 #1192822 #1193565 #1194044 #1194363
#1194464 #1195043 #1195282
Cross-References: CVE-2018-20433 CVE-2019-5427
CVSS scores:
CVE-2018-20433 (NVD) : 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2018-20433 (SUSE): 4.8 CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
CVE-2019-5427 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2019-5427 (SUSE): 5.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
Affected Products:
SUSE Linux Enterprise Module for SUSE Manager Server 4.1
SUSE Manager Server 4.1
______________________________________________________________________________
An update that solves two vulnerabilities and has 11 fixes
is now available.
Description:
This update fixes the following issues:
c3p0:
- Update to version c3p0 0.9.5.5 and mchange-commons-java 0.2.19
* Address CVE-2018-20433
* Address CVE-2019-5427 - XML-config parsing related attacks
(bsc#1133198)
* Properly implement the JDBC 4.1 abort method
- Build with log4j mapper
- Enhanced for RHEL8
dhcpd-formula:
- Update to version 0.1.1641480250.d5bd14c
* make routers option optional
- Add arm64 support
- Update to version 0.1.1615805990.f15c8d9
hub-xmlrpc-api:
- Updated to build on Enterprise Linux 8.
py26-compat-msgpack-python:
- Adapted to build on OBS for Enterprise Linux.
py27-compat-salt:
- Fix inspector module export function (bsc#1097531)
- Fix possible traceback on ip6_interface grain (bsc#1193565)
- Don't check for cached pillar errors on state.apply (bsc#1190781)
- Simplify "transactional_update" module to not use SSH wrapper and allow
more flexible execution
- Add "--no-return-event" option to salt-call to prevent sending return
event back to master.
- Make "state.highstate" to acts on concurrent flag.
- Fix the regression with invalid syntax in test_parse_cpe_name_v23.
spacecmd:
- Version 4.1.17-1
* Fix interactive mode for "system_applyerrata" and "errata_apply"
(bsc#1194363)
spacewalk-java:
- Version 4.1.44-1
* allow SCC to display the last check-in time for registered systems
* Suggest Product Migration when patch for CVE is in a successor Product
(bsc#1191360)
* Add store info to Equals and hash methods to fix CVE audit process
(bsc#1195282)
* fix ClassCastException during action processing (bsc#1195043)
* Fix disappearing metadata key files after channel change (bsc#1192822)
* Pass only selected servers to taskomatic for cancelation (bsc#1194044)
spacewalk-web:
- Version 4.1.32-1
* Suggest Product Migration when patch for CVE is in a successor Product
(bsc#1191360)
susemanager:
- Version 4.1.33-1
* set default for registration batch size
susemanager-doc-indexes:
- Added a warning about the origin of the salt-minion package in the
Register on the Command Line (Salt) section of the Client Configuration
Guide
- In the Client Configuration Guide, explain how you find channel names to
register older SUSE Linux Enterprise clients.
- Added grub.cfg for GRUB 2 in the Upgrade chapter of the Client
susemanager-docs_en:
- Added a warning about the origin of the salt-minion package in the
Register on the Command Line (Salt) section of the Client Configuration
Guide
- In the Client Configuration Guide, explain how you find channel names to
register older SUSE Linux Enterprise clients.
- Added grub.cfg for GRUB 2 in the Upgrade chapter of the Client
Configuration Guide
susemanager-schema:
- Version 4.1.25-1
* Continue with index migration when the expected indexes do not exist
(bsc#1192566)
susemanager-sls:
- Version 4.1.34-1
* Improve `pkgset` beacon with using `salt.cache` to notify about the
changes made while the minion was stopped.
* Align the code of pkgset beacon to prevent warnings (bsc#1194464)
- Version 4.1.33-1
* Fix errors on calling sed -E ... by force_restart_minion with action
chains
* Postgres exporter package was renamed
* fix deprecation warnings
* enforce correct minion configuration similar to bootstrapping
(bsc#1192510)
How to apply this update:
1. Log in as root user to the SUSE Manager server. 2. Stop the Spacewalk
service: `spacewalk-service stop` 3. Apply the patch using either zypper
patch or YaST Online Update. 4. Start the Spacewalk service:
`spacewalk-service start`
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Module for SUSE Manager Server 4.1:
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.1-2022-798=1
Package List:
- SUSE Linux Enterprise Module for SUSE Manager Server 4.1 (ppc64le s390x x86_64):
hub-xmlrpc-api-0.7-3.9.2
py26-compat-msgpack-python-0.4.6-3.6.2
py26-compat-msgpack-python-debuginfo-0.4.6-3.6.2
py26-compat-msgpack-python-debugsource-0.4.6-3.6.2
susemanager-4.1.33-3.45.2
susemanager-tools-4.1.33-3.45.2
- SUSE Linux Enterprise Module for SUSE Manager Server 4.1 (noarch):
c3p0-0.9.5.5-3.3.2
dhcpd-formula-0.1.1641480250.d5bd14c-3.3.2
py27-compat-salt-3000.3-6.21.2
spacecmd-4.1.17-4.36.2
spacewalk-base-4.1.32-3.42.2
spacewalk-base-minimal-4.1.32-3.42.2
spacewalk-base-minimal-config-4.1.32-3.42.2
spacewalk-html-4.1.32-3.42.2
spacewalk-java-4.1.44-3.66.2
spacewalk-java-config-4.1.44-3.66.2
spacewalk-java-lib-4.1.44-3.66.2
spacewalk-java-postgresql-4.1.44-3.66.2
spacewalk-taskomatic-4.1.44-3.66.2
susemanager-doc-indexes-4.1-11.52.2
susemanager-docs_en-4.1-11.52.2
susemanager-docs_en-pdf-4.1-11.52.2
susemanager-schema-4.1.25-3.42.2
susemanager-sls-4.1.34-3.59.2
susemanager-web-libs-4.1.32-3.42.2
uyuni-config-modules-4.1.34-3.59.2
References:
https://www.suse.com/security/cve/CVE-2018-20433.html
https://www.suse.com/security/cve/CVE-2019-5427.html
https://bugzilla.suse.com/1097531
https://bugzilla.suse.com/1133198
https://bugzilla.suse.com/1190781
https://bugzilla.suse.com/1191360
https://bugzilla.suse.com/1192510
https://bugzilla.suse.com/1192566
https://bugzilla.suse.com/1192822
https://bugzilla.suse.com/1193565
https://bugzilla.suse.com/1194044
https://bugzilla.suse.com/1194363
https://bugzilla.suse.com/1194464
https://bugzilla.suse.com/1195043
https://bugzilla.suse.com/1195282
More information about the sle-security-updates
mailing list