Description
Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.26.0, when a container image is malformed or contains no layers, containerd falls back to bind-mounting an empty snapshotter directory for the container rootfs. When the Kata runtime attempts to mount the container rootfs, the bind mount causes the rootfs to be detected as a block device, leading to the underlying device being hotplugged to the guest. This can cause filesystem-level errors on the host due to double inode allocation, and may lead to the host's block device being mounted as read-only. Version 3.26.0 contains a patch for the issue.
Published: 2026-01-29
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Host filesystem corruption and potential read‑only state of block devices
Action: Patch
AI Analysis

Impact

When Kata Containers processes a container image that is malformed or has no layers, the on‑disk image store is fall‑backed to a bind‑mounted empty directory. The runtime interprets this bind mount as a block device. The host’s underlying block device is then hot‑plugged into the guest VM. In such a scenario the host filesystem can suffer from double inode allocation errors, and the block device may become mounted read‑only, compromising file integrity and availability. The flaw maps to CWE‑1287 and CWE‑754, which reflect misuse of block device semantics and inconsistent block device handling.

Affected Systems

This vulnerability affects all versions of Kata Containers prior to 3.26.0. The product is provided by Kata Containers Ltd. and is identified in the CNA as kata-containers:kata-containers. Users running any earlier release are susceptible.

Risk and Exploitability

The CVSS score is 8.8, indicating high severity. EPSS predicts a very low but non‑zero exploitation probability (<1%) and the issue has not been listed in the CISA KEV catalog. The likely attack path involves an attacker being able to supply a malformed container image to the host, either by compromising a container registry or by obtaining write access to the host’s container image store. Successful exploitation would trigger the erroneous hot‑plug of the host block device into the VM, leading to filesystem corruption and a read‑only state that may impact host operations.

Generated by OpenCVE AI on April 18, 2026 at 01:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Kata Containers to version 3.26.0 or later
  • Ensure that all container images contain valid layers before starting a container
  • Configure containerd or Kata to reject or quarantine malformed images and avoid bind‑mounting empty snapshot directories
  • Restrict image registry access and monitor for unexpected image changes
  • If an upgrade cannot be performed immediately, de‑mount any hot‑plugged block devices and repair inode allocation or restore from backup

Generated by OpenCVE AI on April 18, 2026 at 01:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Feb 2026 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Katacontainers kata Containers
CPEs cpe:2.3:a:katacontainers:kata_containers:*:*:*:*:*:*:*:*
Vendors & Products Katacontainers kata Containers
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H'}

cvssV3_1

{'score': 10.0, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H'}


Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Katacontainers
Katacontainers kata-containers
Vendors & Products Katacontainers
Katacontainers kata-containers

Fri, 30 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1287
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H'}

threat_severity

Moderate


Thu, 29 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 17:45:00 +0000

Type Values Removed Values Added
Description Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.26.0, when a container image is malformed or contains no layers, containerd falls back to bind-mounting an empty snapshotter directory for the container rootfs. When the Kata runtime attempts to mount the container rootfs, the bind mount causes the rootfs to be detected as a block device, leading to the underlying device being hotplugged to the guest. This can cause filesystem-level errors on the host due to double inode allocation, and may lead to the host's block device being mounted as read-only. Version 3.26.0 contains a patch for the issue.
Title Kata Containers Runtime: Host block device can be hotplugged to the VM if the container image is malformed or contains no layers
Weaknesses CWE-754
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:H/SA:H/E:P'}


Subscriptions

Katacontainers Kata-containers Kata Containers
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-29T21:24:54.166Z

Reserved: 2026-01-20T22:30:11.778Z

Link: CVE-2026-24054

cve-icon Vulnrichment

Updated: 2026-01-29T21:24:47.129Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T18:16:15.270

Modified: 2026-02-24T18:20:17.090

Link: CVE-2026-24054

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-01-29T17:16:56Z

Links: CVE-2026-24054 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:30:16Z

Weaknesses