Security update - OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks. (CVE-2020-15078)
Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:
sudo dnf upgrade --refresh --advisory=FEDORA-2021-b805c26afa
Please login to add feedback.
This update has been submitted for testing by dsommers.
This update's test gating status has been changed to 'ignored'.
This update's test gating status has been changed to 'waiting'.
This update's test gating status has been changed to 'ignored'.
This update has been pushed to testing.
dsommers edited this update.
It doesn't restart the OpenVPN (server) processes for me. But maybe I screwed up the systemd configuration?
All fine after (me) restarting the OpenVPN server processes though!
Glob pattern passed, but globs are not supported for this. Invalid unit name "openvpn-client@.service" escaped as "openvpn-client@\x2a.service". Glob pattern passed, but globs are not supported for this. Invalid unit name "openvpn-server@.service" escaped as "openvpn-server@\x2a.service".
Manual update message: /usr/lib/tmpfiles.d/elasticsearch.conf:1: Line references path below legacy directory /var/run/, updating /var/run/elasticsearch → /run/elasticsearch; please update the tmpfiles.d/ drop-in file accordingly.
Works
This update has been submitted for stable by bodhi.
This update has been pushed to stable.
Thanks for the glob pattern notifications; I see someone created #1953687, which I will follow up.