<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">openvpn-2.5.3-1.2 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:11128-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">openvpn-2.5.3-1.2 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the openvpn-2.5.3-1.2 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-11128</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2005-3393/</URL>
      <Description>SUSE CVE CVE-2005-3393 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2005-3409/</URL>
      <Description>SUSE CVE CVE-2005-3409 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-1629/</URL>
      <Description>SUSE CVE CVE-2006-1629 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2006-4339/</URL>
      <Description>SUSE CVE CVE-2006-4339 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-12166/</URL>
      <Description>SUSE CVE CVE-2017-12166 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7521/</URL>
      <Description>SUSE CVE CVE-2017-7521 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7522/</URL>
      <Description>SUSE CVE CVE-2017-7522 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-9336/</URL>
      <Description>SUSE CVE CVE-2018-9336 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-11810/</URL>
      <Description>SUSE CVE CVE-2020-11810 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15078/</URL>
      <Description>SUSE CVE CVE-2020-15078 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="openvpn-2.5.3-1.2">
      <FullProductName ProductID="openvpn-2.5.3-1.2">openvpn-2.5.3-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvpn-auth-pam-plugin-2.5.3-1.2">
      <FullProductName ProductID="openvpn-auth-pam-plugin-2.5.3-1.2">openvpn-auth-pam-plugin-2.5.3-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvpn-devel-2.5.3-1.2">
      <FullProductName ProductID="openvpn-devel-2.5.3-1.2">openvpn-devel-2.5.3-1.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openvpn-down-root-plugin-2.5.3-1.2">
      <FullProductName ProductID="openvpn-down-root-plugin-2.5.3-1.2">openvpn-down-root-plugin-2.5.3-1.2</FullProductName>
    </Branch>
    <Relationship ProductReference="openvpn-2.5.3-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openvpn-2.5.3-1.2">openvpn-2.5.3-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openvpn-auth-pam-plugin-2.5.3-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.5.3-1.2">openvpn-auth-pam-plugin-2.5.3-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openvpn-devel-2.5.3-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openvpn-devel-2.5.3-1.2">openvpn-devel-2.5.3-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openvpn-down-root-plugin-2.5.3-1.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openvpn-down-root-plugin-2.5.3-1.2">openvpn-down-root-plugin-2.5.3-1.2 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Format string vulnerability in the foreign_option function in options.c for OpenVPN 2.0.x allows remote clients to execute arbitrary code via format string specifiers in a push of the dhcp-option command option.</Note>
    </Notes>
    <CVE>CVE-2005-3393</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openvpn-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-devel-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-down-root-plugin-2.5.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2005-3393.html</URL>
        <Description>CVE-2005-3393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/132003</URL>
        <Description>SUSE Bug 132003</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/132085</URL>
        <Description>SUSE Bug 132085</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenVPN 2.x before 2.0.4, when running in TCP mode, allows remote attackers to cause a denial of service (segmentation fault) by forcing the accept function call to return an error status, which leads to a null dereference in an exception handler.</Note>
    </Notes>
    <CVE>CVE-2005-3409</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openvpn-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-devel-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-down-root-plugin-2.5.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2005-3409.html</URL>
        <Description>CVE-2005-3409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/132003</URL>
        <Description>SUSE Bug 132003</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/132085</URL>
        <Description>SUSE Bug 132085</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenVPN 2.0 through 2.0.5 allows remote malicious servers to execute arbitrary code on the client by using setenv with the LD_PRELOAD environment variable.</Note>
    </Notes>
    <CVE>CVE-2006-1629</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openvpn-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-devel-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-down-root-plugin-2.5.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-1629.html</URL>
        <Description>CVE-2006-1629</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/165123</URL>
        <Description>SUSE Bug 165123</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenSSL before 0.9.7, 0.9.7 before 0.9.7k, and 0.9.8 before 0.9.8c, when using an RSA key with exponent 3, removes PKCS-1 padding before generating a hash, which allows remote attackers to forge a PKCS #1 v1.5 signature that is signed by that RSA key and prevents OpenSSL from correctly verifying X.509 and other certificates that use PKCS #1.</Note>
    </Notes>
    <CVE>CVE-2006-4339</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openvpn-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-devel-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-down-root-plugin-2.5.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2006-4339.html</URL>
        <Description>CVE-2006-4339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/202366</URL>
        <Description>SUSE Bug 202366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/203595</URL>
        <Description>SUSE Bug 203595</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/206636</URL>
        <Description>SUSE Bug 206636</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/207635</URL>
        <Description>SUSE Bug 207635</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/215623</URL>
        <Description>SUSE Bug 215623</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/218303</URL>
        <Description>SUSE Bug 218303</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/233584</URL>
        <Description>SUSE Bug 233584</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/564512</URL>
        <Description>SUSE Bug 564512</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.</Note>
    </Notes>
    <CVE>CVE-2017-12166</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openvpn-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-devel-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-down-root-plugin-2.5.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-12166.html</URL>
        <Description>CVE-2017-12166</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1060877</URL>
        <Description>SUSE Bug 1060877</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to remote denial-of-service due to memory exhaustion caused by memory leaks and double-free issue in extract_x509_extension().</Note>
    </Notes>
    <CVE>CVE-2017-7521</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openvpn-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-devel-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-down-root-plugin-2.5.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7521.html</URL>
        <Description>CVE-2017-7521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044947</URL>
        <Description>SUSE Bug 1044947</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenVPN versions before 2.4.3 and before 2.3.17 are vulnerable to denial-of-service by authenticated remote attacker via sending a certificate with an embedded NULL character.</Note>
    </Notes>
    <CVE>CVE-2017-7522</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openvpn-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-devel-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-down-root-plugin-2.5.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.3</BaseScore>
        <Vector>AV:N/AC:M/Au:S/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:L/Au:S/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7522.html</URL>
        <Description>CVE-2017-7522</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044947</URL>
        <Description>SUSE Bug 1044947</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation.</Note>
    </Notes>
    <CVE>CVE-2018-9336</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openvpn-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-devel-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-down-root-plugin-2.5.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-9336.html</URL>
        <Description>CVE-2018-9336</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090647</URL>
        <Description>SUSE Bug 1090647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1090839</URL>
        <Description>SUSE Bug 1090839</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.</Note>
    </Notes>
    <CVE>CVE-2020-11810</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openvpn-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-devel-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-down-root-plugin-2.5.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-11810.html</URL>
        <Description>CVE-2020-11810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1169925</URL>
        <Description>SUSE Bug 1169925</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.</Note>
    </Notes>
    <CVE>CVE-2020-15078</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openvpn-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-auth-pam-plugin-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-devel-2.5.3-1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:openvpn-down-root-plugin-2.5.3-1.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15078.html</URL>
        <Description>CVE-2020-15078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1185279</URL>
        <Description>SUSE Bug 1185279</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
