<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for crmsh</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:1087-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-07-24T14:05:47Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-07-24T14:05:47Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-07-24T14:05:47Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for crmsh</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for crmsh fixes the following issues:

Update to version 4.3.1+20210624.67223df2:

- Fix: ocfs2: Skip verifying UUID for ocfs2 device on top of raid or lvm on the join node (bsc#1187553)
- Fix: history: use Path.mkdir instead of mkdir command(bsc#1179999, CVE-2020-35459)
- Dev: crash_test: Add big warnings to have users' attention to potential failover(jsc#SLE-17979)
- Dev: crash_test: rename preflight_check as crash_test(jsc#SLE-17979)
- Fix: bootstrap: update sbd watchdog timeout when using diskless SBD with qdevice(bsc#1184465)
- Dev: utils: allow configure link-local ipv6 address(bsc#1163460)
- Fix: parse: shouldn't allow property setting with an empty value(bsc#1185423)
- Fix: help: show help message from argparse(bsc#1175982)

This update was imported from the SUSE:SLE-15-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-1087</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDCDHUWYXHAR4IFS55R2KWBURUA5HAL7/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:1087-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1163460</URL>
      <Description>SUSE Bug 1163460</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1175982</URL>
      <Description>SUSE Bug 1175982</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179999</URL>
      <Description>SUSE Bug 1179999</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1184465</URL>
      <Description>SUSE Bug 1184465</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185423</URL>
      <Description>SUSE Bug 1185423</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1187553</URL>
      <Description>SUSE Bug 1187553</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-35459/</URL>
      <Description>SUSE CVE CVE-2020-35459 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="crmsh-4.3.1+20210702.4e0ee8fb-lp152.4.59.1">
      <FullProductName ProductID="crmsh-4.3.1+20210702.4e0ee8fb-lp152.4.59.1">crmsh-4.3.1+20210702.4e0ee8fb-lp152.4.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crmsh-scripts-4.3.1+20210702.4e0ee8fb-lp152.4.59.1">
      <FullProductName ProductID="crmsh-scripts-4.3.1+20210702.4e0ee8fb-lp152.4.59.1">crmsh-scripts-4.3.1+20210702.4e0ee8fb-lp152.4.59.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crmsh-test-4.3.1+20210702.4e0ee8fb-lp152.4.59.1">
      <FullProductName ProductID="crmsh-test-4.3.1+20210702.4e0ee8fb-lp152.4.59.1">crmsh-test-4.3.1+20210702.4e0ee8fb-lp152.4.59.1</FullProductName>
    </Branch>
    <Relationship ProductReference="crmsh-4.3.1+20210702.4e0ee8fb-lp152.4.59.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:crmsh-4.3.1+20210702.4e0ee8fb-lp152.4.59.1">crmsh-4.3.1+20210702.4e0ee8fb-lp152.4.59.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="crmsh-scripts-4.3.1+20210702.4e0ee8fb-lp152.4.59.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:crmsh-scripts-4.3.1+20210702.4e0ee8fb-lp152.4.59.1">crmsh-scripts-4.3.1+20210702.4e0ee8fb-lp152.4.59.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="crmsh-test-4.3.1+20210702.4e0ee8fb-lp152.4.59.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:crmsh-test-4.3.1+20210702.4e0ee8fb-lp152.4.59.1">crmsh-test-4.3.1+20210702.4e0ee8fb-lp152.4.59.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call "crm history" (when "crm" is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges.</Note>
    </Notes>
    <CVE>CVE-2020-35459</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:crmsh-4.3.1+20210702.4e0ee8fb-lp152.4.59.1</ProductID>
        <ProductID>openSUSE Leap 15.2:crmsh-scripts-4.3.1+20210702.4e0ee8fb-lp152.4.59.1</ProductID>
        <ProductID>openSUSE Leap 15.2:crmsh-test-4.3.1+20210702.4e0ee8fb-lp152.4.59.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDCDHUWYXHAR4IFS55R2KWBURUA5HAL7/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-35459.html</URL>
        <Description>CVE-2020-35459</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179999</URL>
        <Description>SUSE Bug 1179999</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
