CVE-2026-24708

An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using the Flat image backend (usually configured with use_cow_images=False) are affected.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.2 HIGH
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H
mitreCNA
8.2 HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 12%
Debian logo
Debian Releases
Debian Product
Codename
nova
bookworm
vulnerable
bookworm (security)
2:26.2.2-1~deb12u4
fixed
bullseye
vulnerable
bullseye (security)
vulnerable
forky
2:32.1.0-7
fixed
sid
2:32.1.0-7
fixed
trixie
vulnerable
trixie (security)
2:31.0.0-6+deb13u2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
nova
bionic
needs-triage
focal
needs-triage
jammy
Fixed 3:25.2.1-0ubuntu2.10
released
noble
Fixed 3:29.2.0-0ubuntu1.3
released
questing
Fixed 3:32.0.0-0ubuntu1.1
released
xenial
needs-triage