Dan Smith, Julia Kreger and Jay Faulkner discovered that in image processing for Ironic, a specially crafted image could be used by an authenticated user to exploit undesired behaviors in qemu-img, including possible unauthorized access to potentially sensitive data.
{
"binaries": [
{
"binary_version": "1:20.1.0-0ubuntu1.2",
"binary_name": "ironic-api"
},
{
"binary_version": "1:20.1.0-0ubuntu1.2",
"binary_name": "ironic-common"
},
{
"binary_version": "1:20.1.0-0ubuntu1.2",
"binary_name": "ironic-conductor"
},
{
"binary_version": "1:20.1.0-0ubuntu1.2",
"binary_name": "python3-ironic"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "1:24.1.1-0ubuntu1.2",
"binary_name": "ironic-api"
},
{
"binary_version": "1:24.1.1-0ubuntu1.2",
"binary_name": "ironic-common"
},
{
"binary_version": "1:24.1.1-0ubuntu1.2",
"binary_name": "ironic-conductor"
},
{
"binary_version": "1:24.1.1-0ubuntu1.2",
"binary_name": "python3-ironic"
}
],
"availability": "No subscription required"
}