Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-24708

Опубликовано: 17 фев. 2026
Источник: redhat
CVSS3: 7.1
EPSS Низкий

Описание

An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using the Flat image backend (usually configured with use_cow_images=False) are affected.

A flaw in OpenStack Nova’s interaction with the qemu-img utility allows an authenticated user to overwrite arbitrary files on the compute host. This occurs because Nova invokes qemu-img without strictly constraining the disk image format, enabling a malicious user to craft a QCOW2 header on a raw disk and trigger destructive behavior during instance operations such as resize.

Отчет

This vulnerability is rated Important for Red Hat OpenStack Platform. An authenticated attacker can exploit unconstrained disk format handling in OpenStack Nova when invoking qemu-img. By crafting a QCOW2 header on an ephemeral or root disk, an attacker can cause qemu-img to overwrite arbitrary files on the compute host with Nova's write access, leading to data destruction or denial of service.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenStack Platform 13 (Queens)rhosp13/openstack-nova-computeAffected
Red Hat OpenStack Platform 16.2rhosp12/openstack-nova-computeNot affected
Red Hat OpenStack Platform 16.2rhosp-rhel8/openstack-nova-computeAffected
Red Hat OpenStack Platform 16.2rhosp-rhel9/openstack-nova-computeNot affected
Red Hat OpenStack Platform 17.1rhosp12/openstack-nova-computeNot affected
Red Hat OpenStack Platform 17.1rhosp-rhel9/openstack-nova-computeAffected
Red Hat OpenStack Platform 18.0rhoso/openstack-nova-compute-rhel9Not affected
Red Hat OpenStack Platform 18.0rhosp12/openstack-nova-computeNot affected
Red Hat OpenStack Platform 18.0rhosp-rhel9/openstack-nova-computeAffected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-73
https://bugzilla.redhat.com/show_bug.cgi?id=2430312openstack-nova-compute: Arbitrary Host File Overwrite via Unconstrained qemu-img Format Handling in OpenStack Nova

EPSS

Процентиль: 22%
0.00072
Низкий

7.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.2
ubuntu
около 1 месяца назад

An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using the Flat image backend (usually configured with use_cow_images=False) are affected.

CVSS3: 8.2
nvd
около 1 месяца назад

An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using the Flat image backend (usually configured with use_cow_images=False) are affected.

CVSS3: 8.2
debian
около 1 месяца назад

An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31. ...

CVSS3: 8.2
github
около 1 месяца назад

OpenStack Nova calls qemu-img without format restrictions for resize

EPSS

Процентиль: 22%
0.00072
Низкий

7.1 High

CVSS3