Bug 2105073 (CVE-2022-33737, CVE-2022-33738)

Summary: CVE-2022-33737 CVE-2022-33738 openvpn: weak random number generator
Product: [Other] Security Response Reporter: Sage McTaggart <amctagga>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: huzaifas, klember, saroy, steve
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-09-02 14:55:48 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2120483, 2120484    
Bug Blocks: 2105074    

Description Sage McTaggart 2022-07-07 20:24:21 UTC
OpenVPN Access Server before 2.11 uses a weak random generator used to create user session token for the web portal

https://openvpn.net/vpn-server-resources/release-notes/#openvpn-access-server-2-11-0

Comment 1 Sandipan Roy 2022-08-23 04:39:13 UTC
Created openvpn tracking bugs for this issue:

Affects: epel-all [bug 2120483]
Affects: fedora-all [bug 2120484]

Comment 2 David Sommerseth 2022-08-23 10:58:15 UTC
This is about OpenVPN ACCESS SERVER.  That is not a Fedora package project.  Removing myself from this ticket.

Comment 3 Product Security DevOps Team 2022-09-02 14:55:46 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.