CVE-2024-53916

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-53916
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-53916.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-53916
Aliases
Related
Published
2024-11-25T00:15:04Z
Modified
2025-01-14T12:17:31.381548Z
Summary
[none]
Details

In OpenStack Neutron before 25.0.1, neutron/extensions/tagging.py can use an incorrect ID during policy enforcement. It does not apply the proper policy check for changing network tags. An unprivileged tenant is able to change (add and clear) tags on network objects that do not belong to the tenant, and this action is not subjected to the proper policy authorization check. This affects 23 before 23.2.1, 24 before 24.0.2, and 25 before 25.0.1.

References

Affected packages

Debian:13 / neutron

Package

Name
neutron
Purl
pkg:deb/debian/neutron?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:25.0.0-2

Affected versions

2:21.*

2:21.0.0-7

2:22.*

2:22.0.0~rc1-1
2:22.0.0~rc1-2
2:22.0.0-1
2:22.0.0-2
2:22.0.1-1
2:22.0.1-2

2:23.*

2:23.0.0~b3-1
2:23.0.0~rc1-1
2:23.0.0-1
2:23.0.0-2

2:24.*

2:24.0.0~rc1-1
2:24.0.0-1
2:24.0.0-2
2:24.0.0-3
2:24.0.0-3.1

2:25.*

2:25.0.0~rc1-1
2:25.0.0~rc1-2
2:25.0.0~rc2-1
2:25.0.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}