CVE-2026-24708

EUVD-2026-7738
An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using the Flat image backend (usually configured with use_cow_images=False) are affected.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
mitreCNA
8.2 HIGH
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
openstacknova
𝑥
< 30.2.2
CNA
openstacknova
31.0.0 ≤
𝑥
< 31.2.1
CNA
openstacknova
32.0.0 ≤
𝑥
< 32.1.1
CNA
Debian logo
Debian Releases
Debian Product
Codename
nova
bookworm
vulnerable
bookworm (security)
2:26.2.2-1~deb12u4
fixed
bullseye
vulnerable
bullseye (security)
2:22.4.0-1~deb11u7
fixed
forky
2:33.0.0~rc1-5
fixed
sid
2:33.0.0-3
fixed
trixie
2:31.0.0-6+deb13u2
fixed
trixie (security)
2:31.0.0-6+deb13u2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
nova
bionic
needs-triage
focal
needs-triage
jammy
Fixed 3:25.2.1-0ubuntu2.10
released
noble
Fixed 3:29.2.0-0ubuntu1.3
released
questing
Fixed 3:32.0.0-0ubuntu1.1
released
xenial
needs-triage