Security update for SUSE Manager 3.2

Announcement ID: SUSE-SU-2020:3251-1
Rating: critical
References:
Cross-References:
CVSS scores:
  • CVE-2020-16846 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2020-16846 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2020-17490 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • CVE-2020-17490 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  • CVE-2020-25592 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2020-25592 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
  • SUSE Linux Enterprise High Performance Computing 12 SP3
  • SUSE Linux Enterprise High Performance Computing 12 SP4
  • SUSE Linux Enterprise Server 12 SP3
  • SUSE Linux Enterprise Server 12 SP4
  • SUSE Manager Server 3.2

An update that solves three vulnerabilities can now be installed.

Description:

This security update for SUSE Manager 3.2 fixes the following issues:

py26-compat-salt:

  • Properly validate eauth credentials and tokens on SSH calls made by Salt API (bsc#1178319, bsc#1178362, bsc#1178361, CVE-2020-25592, CVE-2020-17490, CVE-2020-16846)

spacewalk-java:

  • Use correct eauth module and credentials for Salt SSH calls (bsc#1178319, CVE-2020-25592)

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Manager Server 3.2
    zypper in -t patch SUSE-SUSE-Manager-Server-3.2-2020-3251=1

Package List:

  • SUSE Manager Server 3.2 (noarch)
    • py26-compat-salt-2016.11.10-6.41.1
    • spacewalk-java-postgresql-2.8.78.31-3.56.1
    • spacewalk-taskomatic-2.8.78.31-3.56.1
    • spacewalk-java-oracle-2.8.78.31-3.56.1
    • spacewalk-java-lib-2.8.78.31-3.56.1
    • spacewalk-java-config-2.8.78.31-3.56.1
    • spacewalk-java-2.8.78.31-3.56.1

References: