{"affected":[{"ecosystem_specific":{"binaries":[{"crmsh":"4.3.1+20210702.4e0ee8fb-lp152.4.59.1","crmsh-scripts":"4.3.1+20210702.4e0ee8fb-lp152.4.59.1","crmsh-test":"4.3.1+20210702.4e0ee8fb-lp152.4.59.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.2","name":"crmsh","purl":"pkg:rpm/opensuse/crmsh&distro=openSUSE%20Leap%2015.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.3.1+20210702.4e0ee8fb-lp152.4.59.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for crmsh fixes the following issues:\n\nUpdate to version 4.3.1+20210624.67223df2:\n\n- Fix: ocfs2: Skip verifying UUID for ocfs2 device on top of raid or lvm on the join node (bsc#1187553)\n- Fix: history: use Path.mkdir instead of mkdir command(bsc#1179999, CVE-2020-35459)\n- Dev: crash_test: Add big warnings to have users' attention to potential failover(jsc#SLE-17979)\n- Dev: crash_test: rename preflight_check as crash_test(jsc#SLE-17979)\n- Fix: bootstrap: update sbd watchdog timeout when using diskless SBD with qdevice(bsc#1184465)\n- Dev: utils: allow configure link-local ipv6 address(bsc#1163460)\n- Fix: parse: shouldn't allow property setting with an empty value(bsc#1185423)\n- Fix: help: show help message from argparse(bsc#1175982)\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.","id":"openSUSE-SU-2021:1087-1","modified":"2021-07-24T14:05:47Z","published":"2021-07-24T14:05:47Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VDCDHUWYXHAR4IFS55R2KWBURUA5HAL7/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1163460"},{"type":"REPORT","url":"https://bugzilla.suse.com/1175982"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179999"},{"type":"REPORT","url":"https://bugzilla.suse.com/1184465"},{"type":"REPORT","url":"https://bugzilla.suse.com/1185423"},{"type":"REPORT","url":"https://bugzilla.suse.com/1187553"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-35459"}],"related":["CVE-2020-35459"],"summary":"Security update for crmsh","upstream":["CVE-2020-35459"]}