Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <cd27d6ad-d290-4eb4-b911-5a9161b708c6@jvf.cc>
Date: Thu, 8 May 2025 08:18:32 -0700
From: Jay Faulkner <jay@....cc>
To: oss-security@...ts.openwall.com
Subject: OSSA-2025-001 / CVE-2025-44021: OpenStack Ironic fails to restrict paths used for file:// image URLs

=========================================================================
OSSA-2025-001: Ironic fails to restrict paths used forfile:// image URLs
=========================================================================

:Date: May 08, 2024
:CVE: CVE-2025-44021


Affects
~~~~~~~
- Ironic: <24.1.3, >=25.0.0 <26.1.1, >=27.0.0, <29.0.1


Description
~~~~~~~~~~~
Julia Kreger of Red Hat noticed a vulnerability in image handling for
Ironic. A malicious project assigned as a node owner can provide a path to
any local file readable by the ironic-conductor which may then be written
to the target node disk. This is only possible via deployments
performed directly via Ironic's API and cannot be triggered via Nova's virt
driver.

This is difficult to exploit in practice, as a node deployed in this manner
should not ever reach ACTIVE state, but it still represents a danger in
environments running with non-default, insecure configurations such as with
automated cleaning disabled.


Patches
~~~~~~~
-https://review.opendev.org/c/openstack/ironic/+/949175 (2024.1/caracal)
-https://review.opendev.org/c/openstack/ironic/+/949174 (2024.2/dalmatian)
-https://review.opendev.org/c/openstack/ironic/+/949173 (2025.1/epoxy)
- Patch attached tohttps://bugs.launchpad.net/ironic/+bug/2107847/comments/47 (Bobcat/2023.2-eol)
-https://review.opendev.org/c/openstack/ironic/+/949186 (Bugfix/26.0)
-https://review.opendev.org/c/openstack/ironic/+/949185 (Bugfix/27.0)
-https://review.opendev.org/c/openstack/ironic/+/949184 (Bugfix/28.0)
-https://review.opendev.org/c/openstack/ironic/+/949172 (Master)
-https://review.opendev.org/c/openstack/ironic/+/949182 (Unmaintained/2023.1 antelope)
-https://review.opendev.org/c/openstack/ironic/+/949179 (Unmaintained/xena)
-https://review.opendev.org/c/openstack/ironic/+/949177 (Unmaintained/yoga)
-https://review.opendev.org/c/openstack/ironic/+/949176 (Unmaintained/zed)


Credits
~~~~~~~
- Julia Kreger from Red Hat (CVE-2025-44021)


References
~~~~~~~~~~
-https://launchpad.net/bugs/2107847
-http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-44021


Notes
~~~~~
- Patches have been provided for all supported Ironic branches. As a
   courtesy, we have also provided patches for some unmaintained branches
   and the recently end-of-life 2023.2/bobcat release. As usual, we will
   provide updated releases off maintained branches, but will not create
   new releases off bugfix or unmaintained branches.


Content of type "text/html" skipped

Download attachment "OpenPGP_0x6B75D939B424C6D4.asc" of type "application/pgp-keys" (5565 bytes)

Download attachment "OpenPGP_signature.asc" of type "application/pgp-signature" (496 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.