Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Feb 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Katacontainers kata Containers
|
|
| CPEs | cpe:2.3:a:katacontainers:kata_containers:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Katacontainers kata Containers
|
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Katacontainers
Katacontainers kata-containers |
|
| Vendors & Products |
Katacontainers
Katacontainers kata-containers |
Fri, 30 Jan 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1287 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 29 Jan 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.26.0, when a container image is malformed or contains no layers, containerd falls back to bind-mounting an empty snapshotter directory for the container rootfs. When the Kata runtime attempts to mount the container rootfs, the bind mount causes the rootfs to be detected as a block device, leading to the underlying device being hotplugged to the guest. This can cause filesystem-level errors on the host due to double inode allocation, and may lead to the host's block device being mounted as read-only. Version 3.26.0 contains a patch for the issue. | |
| Title | Kata Containers Runtime: Host block device can be hotplugged to the VM if the container image is malformed or contains no layers | |
| Weaknesses | CWE-754 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-29T21:24:54.166Z
Reserved: 2026-01-20T22:30:11.778Z
Link: CVE-2026-24054
Updated: 2026-01-29T21:24:47.129Z
Status : Analyzed
Published: 2026-01-29T18:16:15.270
Modified: 2026-02-24T18:20:17.090
Link: CVE-2026-24054
OpenCVE Enrichment
Updated: 2026-01-30T08:43:19Z