Dan Smith, Julia Kreger and Jay Faulkner discovered that in image processing for Ironic, a specially crafted image could be used by an authenticated user to exploit undesired behaviors in qemu-img, including possible unauthorized access to potentially sensitive data.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1:20.1.0-0ubuntu1.2", "binary_name": "ironic-api" }, { "binary_version": "1:20.1.0-0ubuntu1.2", "binary_name": "ironic-common" }, { "binary_version": "1:20.1.0-0ubuntu1.2", "binary_name": "ironic-conductor" }, { "binary_version": "1:20.1.0-0ubuntu1.2", "binary_name": "python3-ironic" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1:24.1.1-0ubuntu1.2", "binary_name": "ironic-api" }, { "binary_version": "1:24.1.1-0ubuntu1.2", "binary_name": "ironic-common" }, { "binary_version": "1:24.1.1-0ubuntu1.2", "binary_name": "ironic-conductor" }, { "binary_version": "1:24.1.1-0ubuntu1.2", "binary_name": "python3-ironic" } ] }