<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for openvpn</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2021:0734-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-05-15T16:04:52Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-15T16:04:52Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-05-15T16:04:52Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for openvpn</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for openvpn fixes the following issues:

- CVE-2020-15078: Fixed authentication bypass with deferred authentication (bsc#1185279).
- CVE-2020-11810: Fixed race condition between allocating peer-id and initializing data channel key (bsc#1169925).
- CVE-2018-7544: Fixed cross-protocol scripting issue that was discovered in the management interface (bsc#1085803).

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2021-734</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5VK3H4AGK4ZRCLIB2D3IB7SS5RI4AZK/</URL>
      <Description>E-Mail link for openSUSE-SU-2021:0734-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1085803</URL>
      <Description>SUSE Bug 1085803</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1169925</URL>
      <Description>SUSE Bug 1169925</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1185279</URL>
      <Description>SUSE Bug 1185279</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-7544/</URL>
      <Description>SUSE CVE CVE-2018-7544 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11810/</URL>
      <Description>SUSE CVE CVE-2020-11810 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15078/</URL>
      <Description>SUSE CVE CVE-2020-15078 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.2">
      <Branch Type="Product Name" Name="openSUSE Leap 15.2">
        <FullProductName ProductID="openSUSE Leap 15.2" CPE="cpe:/o:opensuse:leap:15.2">openSUSE Leap 15.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="openvpn-2.4.3-lp152.6.3.1">
      <FullProductName ProductID="openvpn-2.4.3-lp152.6.3.1">openvpn-2.4.3-lp152.6.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvpn-auth-pam-plugin-2.4.3-lp152.6.3.1">
      <FullProductName ProductID="openvpn-auth-pam-plugin-2.4.3-lp152.6.3.1">openvpn-auth-pam-plugin-2.4.3-lp152.6.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvpn-devel-2.4.3-lp152.6.3.1">
      <FullProductName ProductID="openvpn-devel-2.4.3-lp152.6.3.1">openvpn-devel-2.4.3-lp152.6.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvpn-down-root-plugin-2.4.3-lp152.6.3.1">
      <FullProductName ProductID="openvpn-down-root-plugin-2.4.3-lp152.6.3.1">openvpn-down-root-plugin-2.4.3-lp152.6.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="openvpn-2.4.3-lp152.6.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:openvpn-2.4.3-lp152.6.3.1">openvpn-2.4.3-lp152.6.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="openvpn-auth-pam-plugin-2.4.3-lp152.6.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:openvpn-auth-pam-plugin-2.4.3-lp152.6.3.1">openvpn-auth-pam-plugin-2.4.3-lp152.6.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="openvpn-devel-2.4.3-lp152.6.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:openvpn-devel-2.4.3-lp152.6.3.1">openvpn-devel-2.4.3-lp152.6.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="openvpn-down-root-plugin-2.4.3-lp152.6.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.2">
      <FullProductName ProductID="openSUSE Leap 15.2:openvpn-down-root-plugin-2.4.3-lp152.6.3.1">openvpn-down-root-plugin-2.4.3-lp152.6.3.1 as a component of openSUSE Leap 15.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** A cross-protocol scripting issue was discovered in the management interface in OpenVPN through 2.4.5. When this interface is enabled over TCP without a password, and when no other clients are connected to this interface, attackers can execute arbitrary management commands, obtain sensitive information, or cause a denial of service (SIGTERM) by triggering XMLHttpRequest actions in a web browser. This is demonstrated by a multipart/form-data POST to http://localhost:23000 with a "signal SIGTERM" command in a TEXTAREA element. NOTE: The vendor disputes that this is a vulnerability. They state that this is the result of improper configuration of the OpenVPN instance rather than an intrinsic vulnerability, and now more explicitly warn against such configurations in both the management-interface documentation, and with a runtime warning.</Note>
    </Notes>
    <CVE>CVE-2018-7544</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:openvpn-2.4.3-lp152.6.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:openvpn-auth-pam-plugin-2.4.3-lp152.6.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:openvpn-devel-2.4.3-lp152.6.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:openvpn-down-root-plugin-2.4.3-lp152.6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5VK3H4AGK4ZRCLIB2D3IB7SS5RI4AZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7544.html</URL>
        <Description>CVE-2018-7544</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085803</URL>
        <Description>SUSE Bug 1085803</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.</Note>
    </Notes>
    <CVE>CVE-2020-11810</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:openvpn-2.4.3-lp152.6.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:openvpn-auth-pam-plugin-2.4.3-lp152.6.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:openvpn-devel-2.4.3-lp152.6.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:openvpn-down-root-plugin-2.4.3-lp152.6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5VK3H4AGK4ZRCLIB2D3IB7SS5RI4AZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11810.html</URL>
        <Description>CVE-2020-11810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169925</URL>
        <Description>SUSE Bug 1169925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.</Note>
    </Notes>
    <CVE>CVE-2020-15078</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.2:openvpn-2.4.3-lp152.6.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:openvpn-auth-pam-plugin-2.4.3-lp152.6.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:openvpn-devel-2.4.3-lp152.6.3.1</ProductID>
        <ProductID>openSUSE Leap 15.2:openvpn-down-root-plugin-2.4.3-lp152.6.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C5VK3H4AGK4ZRCLIB2D3IB7SS5RI4AZK/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15078.html</URL>
        <Description>CVE-2020-15078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185279</URL>
        <Description>SUSE Bug 1185279</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
