OpenVPN 3 Core Library version 3.6 and 3.6.1 allows a man-in-the-middle attacker to bypass the certificate authentication by issuing an unrelated server certificate using the same hostname found in the verify-x509-name option in a client configuration. Reference: https://community.openvpn.net/openvpn/wiki/CVE-2021-3547
Created openvpn tracking bugs for this issue: Affects: epel-all [bug 1981496] Affects: fedora-all [bug 1981495]
This does NOT affect the 'openvpn' package. This is an issue which hits the 'openvpn3-linux' project, which currently only has Fedora Copr repos: https://copr.fedorainfracloud.org/coprs/dsommers/openvpn3/ This issue was resolved with v14_beta which was released 2021-07-08. https://www.mail-archive.com/openvpn-devel@lists.sourceforge.net/msg22622.html