{
  "Definition": [
    {
      "ID": "oval:org.altlinux.errata:def:20221576",
      "Version": "oval:org.altlinux.errata:def:20221576",
      "Class": "patch",
      "Metadata": {
        "Title": "ALT-PU-2022-1576: package `openvpn` update to version 2.4.9-alt1.c9f2.1",
        "AffectedList": [
          {
            "Family": "unix",
            "Platforms": [
              "ALT Linux branch c9f2"
            ],
            "Products": [
              "ALT SPWorkstation",
              "ALT SPServer"
            ]
          }
        ],
        "References": [
          {
            "RefID": "ALT-PU-2022-1576",
            "RefURL": "https://errata.altlinux.org/ALT-PU-2022-1576",
            "Source": "ALTPU"
          },
          {
            "RefID": "BDU:2021-02221",
            "RefURL": "https://bdu.fstec.ru/vul/2021-02221",
            "Source": "BDU"
          },
          {
            "RefID": "CVE-2020-15078",
            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-15078",
            "Source": "CVE"
          }
        ],
        "Description": "This update upgrades openvpn to version 2.4.9-alt1.c9f2.1. \nSecurity Fix(es):\n\n * BDU:2021-02221: Уязвимость функции отложенной аутентификации  deferred_auth программного обеспечения OpenVPN, позволяющая нарушителю вынудить сервер вернуть сообщение PUSH_REPLY c данными о настройках VPN до отправки сообщения AUTH_FAILED\n\n * CVE-2020-15078: OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.",
        "Advisory": {
          "From": "errata.altlinux.org",
          "Severity": "High",
          "Rights": "Copyright 2024 BaseALT Ltd.",
          "Issued": {
            "Date": "2022-03-25"
          },
          "Updated": {
            "Date": "2022-03-25"
          },
          "BDUs": [
            {
              "ID": "BDU:2021-02221",
              "CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "CWE": "CWE-305",
              "Href": "https://bdu.fstec.ru/vul/2021-02221",
              "Impact": "Low",
              "Public": "20210422"
            }
          ],
          "CVEs": [
            {
              "ID": "CVE-2020-15078",
              "CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
              "CWE": "CWE-306",
              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-15078",
              "Impact": "High",
              "Public": "20210426"
            }
          ],
          "AffectedCPEs": {
            "CPEs": [
              "cpe:/o:alt:spworkstation:8.4",
              "cpe:/o:alt:spserver:8.4"
            ]
          }
        }
      },
      "Criteria": {
        "Operator": "AND",
        "Criterions": [
          {
            "TestRef": "oval:org.altlinux.errata:tst:3001",
            "Comment": "ALT Linux must be installed"
          }
        ],
        "Criterias": [
          {
            "Operator": "OR",
            "Criterions": [
              {
                "TestRef": "oval:org.altlinux.errata:tst:20221576001",
                "Comment": "openvpn is earlier than 0:2.4.9-alt1.c9f2.1"
              },
              {
                "TestRef": "oval:org.altlinux.errata:tst:20221576002",
                "Comment": "openvpn-devel is earlier than 0:2.4.9-alt1.c9f2.1"
              },
              {
                "TestRef": "oval:org.altlinux.errata:tst:20221576003",
                "Comment": "openvpn-docs is earlier than 0:2.4.9-alt1.c9f2.1"
              },
              {
                "TestRef": "oval:org.altlinux.errata:tst:20221576004",
                "Comment": "openvpn-plugins is earlier than 0:2.4.9-alt1.c9f2.1"
              }
            ]
          }
        ]
      }
    }
  ]
}