{"id":5230,"date":"2026-02-17T18:14:27","date_gmt":"2026-02-17T17:14:27","guid":{"rendered":"https:\/\/yaook.cloud\/?page_id=5230"},"modified":"2026-02-17T22:10:11","modified_gmt":"2026-02-17T21:10:11","slug":"security-advisories-cve-2026-24708","status":"publish","type":"page","link":"https:\/\/yaook.cloud\/en\/security-advisories-cve-2026-24708\/","title":{"rendered":"security-advisories\/cve-2026-24708"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"5230\" class=\"elementor elementor-5230\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-56e0628 e-flex e-con-boxed e-con e-parent\" data-id=\"56e0628\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-050bc69 elementor-widget elementor-widget-text-editor\" data-id=\"050bc69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>YAOOK Security Advisory for CVE-2026-24708 \/CVE-2026-24709<\/h1><ul><li>Date: 2026-01-15<\/li><li>Upstream advisory: <a href=\"https:\/\/security.openstack.org\/ossa\/OSSA-2026-002.html\">https:\/\/security.openstack.org\/ossa\/OSSA-2026-002.html<\/a><\/li><li>Upstream bug report: <a href=\"https:\/\/bugs.launchpad.net\/nova\/+bug\/2137507\">https:\/\/bugs.launchpad.net\/nova\/+bug\/2137507<\/a><\/li><\/ul><h2>What is CVE-2026-24708 \/ CVE-2026-24709 and how does it affect YAOOK?<\/h2><p>By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's flat image backend to call qemu-img without a format restriction resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using the Flat image backend (usually configured with use_cow_images=False) are affected.<\/p><h2>Is my cluster vulnerable?<\/h2><p>The following images are vulnerable:<\/p><ul><li>nova-compute images before 4.1.183<\/li><\/ul><p>If any of these images are used in your cluster, the cluster is vulnerable.<\/p><p>By default, yaook don't set use_cow_images, so all yaook clusters with default settings should not be affected.<\/p><h2 id=\"mitigating-factors\">Mitigating factors<\/h2><p>As all OpenStack services deployed via YAOOK run inside containers, the exposure possibilities are more limited than in non-containerised OpenStack deployments.<\/p><p>However, the vulnerability is still critical. If an attacker manages to exploit nova-compute, it is likely possible to exfiltrate disks and potentially also volumes from other workload running on the same or potentially also other hypervisors.<\/p><h2 id=\"upgrading\">Upgrading<\/h2><p>A new stable release <span data-testid=\"commit-title\">1.2.1<\/span> has been published today. You can upgrade to that release simply by updating your operators.<\/p><p>If you don't want to wait for the release, you can use a version override at the nova-operator (adjust the OpenStack version to the version you have deployed):<\/p><p><code>values:<br \/>\u00a0 operator:<br \/>\u00a0 \u00a0 extraEnv:<br \/>\u00a0 \u00a0 - name: YAOOK_OP_VERSIONS_OVERRIDE<br \/>\u00a0 \u00a0 \u00a0 value: |<br \/>\u00a0 \u00a0 \u00a0 \u00a0\u00a0<span class=\"line\" data-lang=\"yaml\"><span class=\"na\">registry.yaook.cloud\/yaook\/nova-compute-2025.1-ubuntu<\/span><span class=\"pi\">:<\/span><\/span>\u00a0<span class=\"line\" data-lang=\"yaml\"><span class=\"na\">registry.yaook.cloud\/yaook\/nova-compute-2025.1-ubuntu<\/span><span class=\"pi\">:<\/span><span class=\"s\">4.1.18<span class=\"idiff left right addition\">3<\/span><\/span><\/span>\u00a0<br \/><\/code><\/p><p>In case you have a large fleet of nova compute nodes, you may want to follow the following procedure in order to speed up the process:<\/p><ul><li><em>NOTE: This procedure bypasses several safety mechansims within YAOOK. Use at your own risk! It is similar to the impact of using yaookctl force-upgrade on all compute nodes.<\/em><\/li><\/ul><ol type=\"1\"><li>Update all operators except the nova-compute-operator to the new release.<\/li><li>Reduce the replica count of the nova-compute-operator deployment to 0.<\/li><li>For each NovaComputeNode nova-compute statefulset, update the nova-compute image version to 4.1.183.<\/li><li>Wait for the StatefulSets to settle.<\/li><li>Update the nova-compute operator, while making sure that it is scaled back up to 1 replica.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>YAOOK Security Advisory for CVE-2026-24708 \/CVE-2026-24709 Date: 2026-01-15 Upstream advisory: https:\/\/security.openstack.org\/ossa\/OSSA-2026-002.html Upstream bug report: https:\/\/bugs.launchpad.net\/nova\/+bug\/2137507 What is CVE-2026-24708 \/\u00a0CVE-2026-24709 and how does it affect YAOOK? By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova\u2019s flat image backend to call qemu-img without a [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5230","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>security-advisories\/cve-2026-24708 &#187; Yaook<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/yaook.cloud\/en\/security-advisories-cve-2026-24708\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"security-advisories\/cve-2026-24708 &#187; Yaook\" \/>\n<meta property=\"og:description\" content=\"YAOOK Security Advisory for CVE-2026-24708 \/CVE-2026-24709 Date: 2026-01-15 Upstream advisory: https:\/\/security.openstack.org\/ossa\/OSSA-2026-002.html Upstream bug report: https:\/\/bugs.launchpad.net\/nova\/+bug\/2137507 What is CVE-2026-24708 \/\u00a0CVE-2026-24709 and how does it affect YAOOK? By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova\u2019s flat image backend to call qemu-img without a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/yaook.cloud\/en\/security-advisories-cve-2026-24708\/\" \/>\n<meta property=\"og:site_name\" content=\"Yaook\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-17T21:10:11+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/yaook.cloud\\\/security-advisories-cve-2026-24708\\\/\",\"url\":\"https:\\\/\\\/yaook.cloud\\\/security-advisories-cve-2026-24708\\\/\",\"name\":\"security-advisories\\\/cve-2026-24708 &#187; Yaook\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/yaook.cloud\\\/#website\"},\"datePublished\":\"2026-02-17T17:14:27+00:00\",\"dateModified\":\"2026-02-17T21:10:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/yaook.cloud\\\/security-advisories-cve-2026-24708\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/yaook.cloud\\\/security-advisories-cve-2026-24708\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/yaook.cloud\\\/security-advisories-cve-2026-24708\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/yaook.cloud\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"security-advisories\\\/cve-2026-24708\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/yaook.cloud\\\/#website\",\"url\":\"https:\\\/\\\/yaook.cloud\\\/\",\"name\":\"Yaook\",\"description\":\"The Lifecycle Management Tool for OpenStack\",\"publisher\":{\"@id\":\"https:\\\/\\\/yaook.cloud\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/yaook.cloud\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/yaook.cloud\\\/#organization\",\"name\":\"ALASCA e.V.\",\"alternateName\":\"Alasca - Verband f\u00fcr betriebsf\u00e4hige, offene Cloud-Infrastrukturen e.V.\",\"url\":\"https:\\\/\\\/yaook.cloud\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/yaook.cloud\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/alasca.cloud\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/favicon.png\",\"contentUrl\":\"https:\\\/\\\/alasca.cloud\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/favicon.png\",\"width\":512,\"height\":512,\"caption\":\"ALASCA e.V.\"},\"image\":{\"@id\":\"https:\\\/\\\/yaook.cloud\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"security-advisories\/cve-2026-24708 \u00bb Yaook","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/yaook.cloud\/en\/security-advisories-cve-2026-24708\/","og_locale":"en_GB","og_type":"article","og_title":"security-advisories\/cve-2026-24708 &#187; Yaook","og_description":"YAOOK Security Advisory for CVE-2026-24708 \/CVE-2026-24709 Date: 2026-01-15 Upstream advisory: https:\/\/security.openstack.org\/ossa\/OSSA-2026-002.html Upstream bug report: https:\/\/bugs.launchpad.net\/nova\/+bug\/2137507 What is CVE-2026-24708 \/\u00a0CVE-2026-24709 and how does it affect YAOOK? By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova\u2019s flat image backend to call qemu-img without a [&hellip;]","og_url":"https:\/\/yaook.cloud\/en\/security-advisories-cve-2026-24708\/","og_site_name":"Yaook","article_modified_time":"2026-02-17T21:10:11+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/yaook.cloud\/security-advisories-cve-2026-24708\/","url":"https:\/\/yaook.cloud\/security-advisories-cve-2026-24708\/","name":"security-advisories\/cve-2026-24708 \u00bb Yaook","isPartOf":{"@id":"https:\/\/yaook.cloud\/#website"},"datePublished":"2026-02-17T17:14:27+00:00","dateModified":"2026-02-17T21:10:11+00:00","breadcrumb":{"@id":"https:\/\/yaook.cloud\/security-advisories-cve-2026-24708\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/yaook.cloud\/security-advisories-cve-2026-24708\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/yaook.cloud\/security-advisories-cve-2026-24708\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/yaook.cloud\/"},{"@type":"ListItem","position":2,"name":"security-advisories\/cve-2026-24708"}]},{"@type":"WebSite","@id":"https:\/\/yaook.cloud\/#website","url":"https:\/\/yaook.cloud\/","name":"Yaook","description":"The Lifecycle Management Tool for OpenStack","publisher":{"@id":"https:\/\/yaook.cloud\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/yaook.cloud\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/yaook.cloud\/#organization","name":"ALASCA e.V.","alternateName":"Alasca - Verband f\u00fcr betriebsf\u00e4hige, offene Cloud-Infrastrukturen e.V.","url":"https:\/\/yaook.cloud\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/yaook.cloud\/#\/schema\/logo\/image\/","url":"https:\/\/alasca.cloud\/wp-content\/uploads\/2022\/08\/favicon.png","contentUrl":"https:\/\/alasca.cloud\/wp-content\/uploads\/2022\/08\/favicon.png","width":512,"height":512,"caption":"ALASCA e.V."},"image":{"@id":"https:\/\/yaook.cloud\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/yaook.cloud\/en\/wp-json\/wp\/v2\/pages\/5230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yaook.cloud\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/yaook.cloud\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/yaook.cloud\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/yaook.cloud\/en\/wp-json\/wp\/v2\/comments?post=5230"}],"version-history":[{"count":18,"href":"https:\/\/yaook.cloud\/en\/wp-json\/wp\/v2\/pages\/5230\/revisions"}],"predecessor-version":[{"id":5253,"href":"https:\/\/yaook.cloud\/en\/wp-json\/wp\/v2\/pages\/5230\/revisions\/5253"}],"wp:attachment":[{"href":"https:\/\/yaook.cloud\/en\/wp-json\/wp\/v2\/media?parent=5230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}