Dan Smith, Julia Kreger and Jay Faulkner discovered that in
image processing for Ironic, a specially crafted image
could be used by an authenticated user to exploit undesired behaviors
in qemu-img, including possible unauthorized access to potentially
sensitive data.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 24.04 | noarch | python3-ironic | < 1:24.1.1-0ubuntu1.2 | UNKNOWN |
Ubuntu | 24.04 | noarch | ironic-api | < 1:24.1.1-0ubuntu1.2 | UNKNOWN |
Ubuntu | 24.04 | noarch | ironic-common | < 1:24.1.1-0ubuntu1.2 | UNKNOWN |
Ubuntu | 24.04 | noarch | ironic-conductor | < 1:24.1.1-0ubuntu1.2 | UNKNOWN |
Ubuntu | 22.04 | noarch | python3-ironic | < 1:20.1.0-0ubuntu1.2 | UNKNOWN |
Ubuntu | 22.04 | noarch | ironic-api | < 1:20.1.0-0ubuntu1.2 | UNKNOWN |
Ubuntu | 22.04 | noarch | ironic-common | < 1:20.1.0-0ubuntu1.2 | UNKNOWN |
Ubuntu | 22.04 | noarch | ironic-conductor | < 1:20.1.0-0ubuntu1.2 | UNKNOWN |