File _patchinfo of Package patchinfo.18430
<patchinfo incident="18430">
<issue tracker="cve" id="2020-35459"/>
<issue tracker="cve" id="2021-3020"/>
<issue tracker="bnc" id="1180571">VUL-0: CVE-2021-3020: hawk2: Root privilege escalation via hawk_invoke and crmsh</issue>
<issue tracker="bnc" id="1154927">ha-cluster-init creates invalid /etc/modules-load.d/watchdog.conf - Failed to find module '/dev/watchdog'</issue>
<issue tracker="bnc" id="1178454">crmsh bootstrap should check crossed configured sbd device</issue>
<issue tracker="bnc" id="1179999">VUL-0: CVE-2020-35459: crmsh: Root privilege escalation via hawk_invoke and crmsh</issue>
<issue tracker="bnc" id="1180688">L3: Long run time of crm_report on HANA systems with optane memory</issue>
<issue tracker="bnc" id="1178869">crmsh bootstrap should configure soft watchdog if needed</issue>
<packager>XinLiang</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for crmsh</summary>
<description>This update for crmsh fixes the following issues:
- Update to version 4.1.0+git.1614156984.f4f5e146:
* Fix: hb_report: walk through hb_report process under hacluster(CVE-2020-35459, bsc#1179999; CVE-2021-3020, bsc#1180571)
* Fix: bootstrap: setup authorized ssh access for hacluster(CVE-2020-35459, bsc#1179999; CVE-2021-3020, bsc#1180571)
* Dev: utils: change default file mod as 644 for str2file function
* Dev: lock: give more specific error message when raise ClaimLockError
* Dev: hb_report: Detect if any ocfs2 partitions exist
* Fix: hb_report: run lsof with specific ocfs2 device(bsc#1180688)
* Dev: corosync: change the permission of corosync.conf to 644
* Fix: bootstrap: Use class Watchdog to simplify watchdog config(bsc#1154927, bsc#1178869)
* Fix: bootstrap: make sure sbd device UUID was the same between nodes(bsc#1178454)
</description>
</patchinfo>