File _patchinfo of Package patchinfo.18430

<patchinfo incident="18430">
  <issue tracker="cve" id="2020-35459"/>
  <issue tracker="cve" id="2021-3020"/>
  <issue tracker="bnc" id="1180571">VUL-0: CVE-2021-3020: hawk2: Root privilege escalation via hawk_invoke and crmsh</issue>
  <issue tracker="bnc" id="1154927">ha-cluster-init creates invalid  /etc/modules-load.d/watchdog.conf - Failed to find module '/dev/watchdog'</issue>
  <issue tracker="bnc" id="1178454">crmsh bootstrap should check crossed configured sbd device</issue>
  <issue tracker="bnc" id="1179999">VUL-0: CVE-2020-35459: crmsh: Root privilege escalation via hawk_invoke and crmsh</issue>
  <issue tracker="bnc" id="1180688">L3: Long run time of crm_report on HANA systems with optane memory</issue>
  <issue tracker="bnc" id="1178869">crmsh bootstrap should configure soft watchdog if needed</issue>
  <packager>XinLiang</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for crmsh</summary>
  <description>This update for crmsh fixes the following issues:

- Update to version 4.1.0+git.1614156984.f4f5e146:
  * Fix: hb_report: walk through hb_report process under hacluster(CVE-2020-35459, bsc#1179999; CVE-2021-3020, bsc#1180571)
  * Fix: bootstrap: setup authorized ssh access for hacluster(CVE-2020-35459, bsc#1179999; CVE-2021-3020, bsc#1180571)
  * Dev: utils: change default file mod as 644 for str2file function
  * Dev: lock: give more specific error message when raise ClaimLockError
  * Dev: hb_report: Detect if any ocfs2 partitions exist
  * Fix: hb_report: run lsof with specific ocfs2 device(bsc#1180688)
  * Dev: corosync: change the permission of corosync.conf to 644
  * Fix: bootstrap: Use class Watchdog to simplify watchdog config(bsc#1154927, bsc#1178869)
  * Fix: bootstrap: make sure sbd device UUID was the same between nodes(bsc#1178454)
</description>
</patchinfo>
openSUSE Build Service is sponsored by