{"dataType":"CVE_RECORD","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2026-24708","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2026-02-21T04:31:45.294Z","dateReserved":"2026-01-24T00:00:00.000Z","datePublished":"2026-02-18T00:00:00.000Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Nova","vendor":"OpenStack","versions":[{"lessThan":"30.2.2","status":"affected","version":"0","versionType":"semver"},{"lessThan":"31.2.1","status":"affected","version":"31.0.0","versionType":"semver"},{"lessThan":"32.1.1","status":"affected","version":"32.0.0","versionType":"semver"}]}],"descriptions":[{"lang":"en","value":"An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using the Flat image backend (usually configured with use_cow_images=False) are affected."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-669","description":"CWE-669 Incorrect Resource Transfer Between Spheres","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre","dateUpdated":"2026-02-18T17:03:53.469Z"},"references":[{"url":"https://bugs.launchpad.net/nova/+bug/2137507"},{"url":"https://www.openwall.com/lists/oss-security/2026/02/17/7"}],"x_generator":{"engine":"enrichogram 0.0.1"},"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":8.2,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H"}}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*","versionEndExcluding":"30.2.2"},{"vulnerable":true,"criteria":"cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*","versionStartIncluding":"31.0.0","versionEndExcluding":"31.2.1"},{"vulnerable":true,"criteria":"cpe:2.3:a:openstack:nova:*:*:*:*:*:*:*:*","versionStartIncluding":"32.0.0","versionEndExcluding":"32.1.1"}]}]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-19T19:07:53.345297Z","id":"CVE-2026-24708","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-19T19:08:07.846Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2026/02/msg00025.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2026-02-21T04:31:45.294Z"}}]},"dataVersion":"5.2"}