PatchSiren cyber security CVE debrief
CVE-2026-44919 Bugs CVE debrief
CVE-2026-44919 describes an availability issue in OpenStack Ironic image handling. In affected versions through 35.x before commit a3f6d73, a file:///dev/zero URL can cause checksum calculations to loop indefinitely, potentially consuming worker resources and delaying image-related operations.
- Vendor
- Bugs
- Product
- Unknown
- CVSS
- MEDIUM 4.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-14
- Original CVE updated
- 2026-05-14
- Advisory published
- 2026-05-14
- Advisory updated
- 2026-05-14
Who should care
OpenStack Ironic operators, especially teams that ingest or process image URLs during provisioning workflows, should review this issue. Environments that allow untrusted or user-influenced image sources deserve the most attention.
Technical summary
The advisory and linked bug report describe an infinite loop during checksum calculation in OpenStack Ironic’s image-handling path. The trigger is a file:///dev/zero URL, which can lead the checksum logic to continue without making progress. The published CVSS vector is CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L, indicating network reachability, low privileges, and an availability impact only. The fix is associated with commit a3f6d735ac3642ab95b49142c7305f072ae748d0.
Defensive priority
Medium. The impact is limited to availability, but the issue is low-complexity and can affect provisioning or image-processing workflows. Prioritize if Ironic handles externally influenced image URLs or if image processing is business-critical.
Recommended defensive actions
- Confirm whether your OpenStack Ironic deployment is at 35.x or earlier and whether it includes commit a3f6d73 or later.
- Review any workflows that accept or transform image URLs, especially file:// schemes, and restrict them unless explicitly required.
- Apply the upstream fix from commit a3f6d735ac3642ab95b49142c7305f072ae748d0 or upgrade to a release that includes it.
- Monitor image-handling and checksum-calculation paths for abnormal CPU use or hung provisioning tasks.
- If you must support file:// inputs, validate and constrain allowed targets so device files such as /dev/zero cannot be referenced.
Evidence notes
This debrief is based only on the supplied GitHub Advisory Database record, the NVD reference, the Launchpad bug reference, and the upstream OpenDev commit reference. The source advisory is marked unreviewed. The CVE publication timestamp used here is 2026-05-14T03:32:08Z, per the supplied record.
Official resources
-
CVE-2026-44919 CVE record
CVE.org
-
CVE-2026-44919 NVD detail
NVD
-
Source item URL
github_advisory_database
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed on 2026-05-14 through the CVE record, NVD, and GitHub Advisory Database. The advisory entry is marked unreviewed and is not reported as withdrawn.