In OpenStack Ironic before 26.0.1 and ironic-python-agent before 9.13.1, there is a vulnerability in image processing, in which a crafted image could be used by an authenticated user to exploit undesired behaviors in qemu-img, including possible unauthorized access to potentially sensitive data. The affected/fixed version details are: Ironic: <21.4.3, >=22.0.0 <23.0.2, >=23.1.0 <24.1.2, >=25.0.0 <26.0.1; Ironic-python-agent: <9.4.2, >=9.5.0 <9.7.1, >=9.8.0 <9.11.1, >=9.12.0 <9.13.1.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1:20.1.0-0ubuntu1.2", "binary_name": "ironic-api" }, { "binary_version": "1:20.1.0-0ubuntu1.2", "binary_name": "ironic-common" }, { "binary_version": "1:20.1.0-0ubuntu1.2", "binary_name": "ironic-conductor" }, { "binary_version": "1:20.1.0-0ubuntu1.2", "binary_name": "python3-ironic" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1:24.1.1-0ubuntu1.2", "binary_name": "ironic-api" }, { "binary_version": "1:24.1.1-0ubuntu1.2", "binary_name": "ironic-common" }, { "binary_version": "1:24.1.1-0ubuntu1.2", "binary_name": "ironic-conductor" }, { "binary_version": "1:24.1.1-0ubuntu1.2", "binary_name": "python3-ironic" } ] }