SB20260424129 - Fedora 43 update for openvpn



SB20260424129 - Fedora 43 update for openvpn

Published: April 24, 2026

Security Bulletin ID SB20260424129
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Race condition (CVE-ID: CVE-2026-40215)

The vulnerability allows a remote attacker to disclose packet data from a previous handshake.

The vulnerability exists due to a race condition in the TLS handshake handling when processing reconnecting sessions. A remote attacker can trigger repeated handshake activity to disclose packet data from a previous handshake.

This occurs only under specific circumstances involving replacement of an old TLS session by a new session while stale session state still attempts to send a packet.


2) Input validation error (CVE-ID: CVE-2026-35058)

The vulnerability allows a remote user to cause a denial of service.

The vulnerability exists due to improper input validation in tls_crypt_v2_extract_client_key and tls_crypt_unwrap when processing a malformed control channel packet. A remote user can send a specially crafted packet to cause a denial of service.

Only setups using tls-crypt-v2 are vulnerable. Exploitation requires possession of a valid tls-crypt-v2 client key, or observation of a handshake using a key with a specific byte property, or injection into a live client session.


Remediation

Install update from vendor's website.