<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for crmsh</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:0410-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-03-14T14:11:13Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-03-14T14:11:13Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-03-14T14:11:13Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for crmsh</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for crmsh fixes the following issues:

- Update to version 4.3.0+20210305.9db5c9a8:
  * Fix: bootstrap: Adjust qdevice configure/remove process to avoid race condition due to quorum lost(bsc#1181415)
  * Dev: cibconfig: remove related code about detecting crm_diff support --no-verion
  * Fix: ui_configure: raise error when params not exist(bsc#1180126)
  * Dev: doc: remove doc for crm node status
  * Dev: ui_node: remove status subcommand

- Update to version 4.3.0+20210219.5d1bf034:
  * Fix: hb_report: walk through hb_report process under hacluster(CVE-2020-35459, bsc#1179999; CVE-2021-3020, bsc#1180571)
  * Fix: bootstrap: setup authorized ssh access for hacluster(CVE-2020-35459, bsc#1179999; CVE-2021-3020, bsc#1180571)
  * Dev: analyze: Add analyze sublevel and put preflight_check in it(jsc#ECO-1658)
  * Dev: utils: change default file mod as 644 for str2file function
  * Dev: hb_report: Detect if any ocfs2 partitions exist
  * Dev: lock: give more specific error message when raise ClaimLockError
  * Fix: Replace mktemp() to mkstemp() for security
  * Fix: Remove the duplicate --cov-report html in tox.
  * Fix: fix some lint issues.
  * Fix: Replace utils.msg_info to task.info
  * Fix: Solve a circular import error of utils.py
  * Fix: hb_report: run lsof with specific ocfs2 device(bsc#1180688)
  * Dev: corosync: change the permission of corosync.conf to 644
  * Fix: preflight_check: task: raise error when report_path isn't a directory
  * Fix: bootstrap: Use class Watchdog to simplify watchdog config(bsc#1154927, bsc#1178869)
  * Dev: Polish the sbd feature.
  * Dev: Replace -f with -c and run check when no parameter provide.
  * Fix: Fix the yes option not working
  * Fix: Remove useless import and show help when no input.
  * Dev: Correct SBD device id inconsistenc during ASR
  * Fix: completers: return complete start/stop resource id list correctly(bsc#1180137)
  * Dev: Makefile.am: change makefile to integrate preflight_check
  * Medium: integrate preflight_check into crmsh(jsc#ECO-1658)
  * Fix: bootstrap: make sure sbd device UUID was the same between nodes(bsc#1178454)

This update was imported from the SUSE:SLE-15-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-410</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNDVFBI7G272LNZ2QQZ4MY56KX2J4C36/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:0410-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1154927</URL>
      <Description>SUSE Bug 1154927</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178454</URL>
      <Description>SUSE Bug 1178454</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1178869</URL>
      <Description>SUSE Bug 1178869</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1179999</URL>
      <Description>SUSE Bug 1179999</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180126</URL>
      <Description>SUSE Bug 1180126</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180137</URL>
      <Description>SUSE Bug 1180137</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180571</URL>
      <Description>SUSE Bug 1180571</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1180688</URL>
      <Description>SUSE Bug 1180688</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181415</URL>
      <Description>SUSE Bug 1181415</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-35459/</URL>
      <Description>SUSE CVE CVE-2020-35459 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-3020/</URL>
      <Description>SUSE CVE CVE-2021-3020 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="crmsh-4.3.0+20210305.9db5c9a8-lp152.4.47.1">
      <FullProductName ProductID="crmsh-4.3.0+20210305.9db5c9a8-lp152.4.47.1">crmsh-4.3.0+20210305.9db5c9a8-lp152.4.47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crmsh-scripts-4.3.0+20210305.9db5c9a8-lp152.4.47.1">
      <FullProductName ProductID="crmsh-scripts-4.3.0+20210305.9db5c9a8-lp152.4.47.1">crmsh-scripts-4.3.0+20210305.9db5c9a8-lp152.4.47.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="crmsh-test-4.3.0+20210305.9db5c9a8-lp152.4.47.1">
      <FullProductName ProductID="crmsh-test-4.3.0+20210305.9db5c9a8-lp152.4.47.1">crmsh-test-4.3.0+20210305.9db5c9a8-lp152.4.47.1</FullProductName>
    </Branch>
    <Relationship ProductReference="crmsh-4.3.0+20210305.9db5c9a8-lp152.4.47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:crmsh-4.3.0+20210305.9db5c9a8-lp152.4.47.1">crmsh-4.3.0+20210305.9db5c9a8-lp152.4.47.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="crmsh-scripts-4.3.0+20210305.9db5c9a8-lp152.4.47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:crmsh-scripts-4.3.0+20210305.9db5c9a8-lp152.4.47.1">crmsh-scripts-4.3.0+20210305.9db5c9a8-lp152.4.47.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="crmsh-test-4.3.0+20210305.9db5c9a8-lp152.4.47.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:crmsh-test-4.3.0+20210305.9db5c9a8-lp152.4.47.1">crmsh-test-4.3.0+20210305.9db5c9a8-lp152.4.47.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in ClusterLabs crmsh through 4.2.1. Local attackers able to call "crm history" (when "crm" is run) were able to execute commands via shell code injection to the crm history commandline, potentially allowing escalation of privileges.</Note>
    </Notes>
    <CVE>CVE-2020-35459</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:crmsh-4.3.0+20210305.9db5c9a8-lp152.4.47.1</ProductID>
        <ProductID>openSUSE Leap 15.2:crmsh-scripts-4.3.0+20210305.9db5c9a8-lp152.4.47.1</ProductID>
        <ProductID>openSUSE Leap 15.2:crmsh-test-4.3.0+20210305.9db5c9a8-lp152.4.47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.2</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNDVFBI7G272LNZ2QQZ4MY56KX2J4C36/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-35459.html</URL>
        <Description>CVE-2020-35459</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1179999</URL>
        <Description>SUSE Bug 1179999</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in ClusterLabs Hawk (aka HA Web Konsole) through 2.3.0-15. It ships the binary hawk_invoke (built from tools/hawk_invoke.c), intended to be used as a setuid program. This allows the hacluster user to invoke certain commands as root (with an attempt to limit this to safe combinations). This user is able to execute an interactive "shell" that isn't limited to the commands specified in hawk_invoke, allowing escalation to root.</Note>
    </Notes>
    <CVE>CVE-2021-3020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:crmsh-4.3.0+20210305.9db5c9a8-lp152.4.47.1</ProductID>
        <ProductID>openSUSE Leap 15.2:crmsh-scripts-4.3.0+20210305.9db5c9a8-lp152.4.47.1</ProductID>
        <ProductID>openSUSE Leap 15.2:crmsh-test-4.3.0+20210305.9db5c9a8-lp152.4.47.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BNDVFBI7G272LNZ2QQZ4MY56KX2J4C36/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-3020.html</URL>
        <Description>CVE-2021-3020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1180571</URL>
        <Description>SUSE Bug 1180571</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
