SB2026052135 - Fedora 43 update for openbao
Published: May 21, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 vulnerabilities.
1) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2026-46358)
CWE-ID: CWE-532 - Information Exposure Through Log Files
CVSSv4: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
The vulnerability allows a local privileged user to disclose sensitive information.
The vulnerability exists due to improper redaction in inline auth audit log handling when recording audit log entries. A local privileged user can access an audit device containing incorrectly redacted logs to disclose sensitive information.
User interaction is passive, and exploitation requires compromise of access to the audit device.
2) Improper access control (CVE-ID: CVE-2026-46405)
CWE-ID: CWE-284 - Improper Access Control
CVSSv4: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Green
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to improper access control in the Kerberos auth method GET handler when handling GET requests or requests with an Authorization: Negotiate header. A remote attacker can send a specially crafted request to cause a denial of service.
The issue creates authentication tokens that are not accessible to the caller and can accumulate in storage.
3) Incorrect authorization (CVE-ID: CVE-2026-45808)
CWE-ID: CWE-863 - Incorrect Authorization
CVSSv4: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
The vulnerability allows a remote user to cause a denial of service.
The vulnerability exists due to incorrect authorization in the legacy sys/revoke and sys/renew endpoints when handling cross-namespace lease revocation or renewal requests. A remote privileged user can submit a lease identifier from another tenant to cause a denial of service.
Exploitation requires that a tenant intentionally leak a lease identifier.
Remediation
Install update from vendor's website.