Source: cyborg
X-Debbugs-CC: [email protected]
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for cyborg.

CVE-2026-40213[0]:
| OpenStack Cyborg before 16.0.1 uses rule:allow (check_str='@') as
| the default policy for multiple API endpoints. This unconditionally
| authorizes any request carrying a valid Keystone token regardless of
| roles, project membership, or scope. An authenticated user with zero
| role assignments can complete various actions such as reprogramming
| FPGA bitstreams on arbitrary compute nodes via agent RPC.

CVE-2026-40214[1]:
| In OpenStack Cyborg before 16.0.1, the Accelerator Request (ARQ) API
| does not enforce project ownership at any layer. The project_id
| column in the database is never populated (NULL for every ARQ),
| database queries have no project filtering, and policy checks are
| self-referential (the authorize_wsgi decorator compares the caller's
| project_id with itself rather than the target resource). Any
| authenticated non-admin user can complete various actions such as
| deleting ARQs bound to other projects' instances, aka cross-tenant
| denial of service.

https://www.openwall.com/lists/oss-security/2026/05/07/6


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-40213
    https://www.cve.org/CVERecord?id=CVE-2026-40213
[1] https://security-tracker.debian.org/tracker/CVE-2026-40214
    https://www.cve.org/CVERecord?id=CVE-2026-40214

Please adjust the affected versions in the BTS as needed.

Reply via email to