Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6145-1 | nova security update |
Github GHSA |
GHSA-m4f3-qp2w-gwh6 | OpenStack Nova calls qemu-img without format restrictions for resize |
Ubuntu USN |
USN-8049-1 | Nova vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openstack compute
|
|
| Vendors & Products |
Openstack compute
|
Wed, 18 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw in OpenStack Nova’s interaction with the qemu-img utility allows an authenticated user to overwrite arbitrary files on the compute host. This occurs because Nova invokes qemu-img without strictly constraining the disk image format, enabling a malicious user to craft a QCOW2 header on a raw disk and trigger destructive behavior during instance operations such as resize. | An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using the Flat image backend (usually configured with use_cow_images=False) are affected. |
| First Time appeared |
Openstack
Openstack nova |
|
| Weaknesses | CWE-669 | |
| CPEs | cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Openstack
Openstack nova |
|
| References |
| |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 18 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw in OpenStack Nova’s interaction with the qemu-img utility allows an authenticated user to overwrite arbitrary files on the compute host. This occurs because Nova invokes qemu-img without strictly constraining the disk image format, enabling a malicious user to craft a QCOW2 header on a raw disk and trigger destructive behavior during instance operations such as resize. | |
| Title | openstack-nova-compute: Arbitrary Host File Overwrite via Unconstrained qemu-img Format Handling in OpenStack Nova | |
| Weaknesses | CWE-73 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-19T19:08:07.846Z
Reserved: 2026-01-24T00:00:00.000Z
Link: CVE-2026-24708
Updated: 2026-02-19T19:08:00.321Z
Status : Awaiting Analysis
Published: 2026-02-18T18:24:33.087
Modified: 2026-02-19T15:53:02.850
Link: CVE-2026-24708
OpenCVE Enrichment
Updated: 2026-02-19T10:20:56Z
Debian DSA
Github GHSA
Ubuntu USN