Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.27.0, an issue in Kata with Cloud Hypervisor allows a user of the container to modify the file system used by the Guest micro VM ultimately achieving arbitrary code execution as root in said VM. The current understanding is this doesn’t impact the security of the Host or of other containers / VMs running on that Host (note that arm64 QEMU lacks NVDIMM read-only support: It is believed that until the upstream QEMU gains this capability, a guest write could reach the image file). Version 3.27.0 patches the issue.
References
| Link | Resource |
|---|---|
| https://github.com/kata-containers/kata-containers/commit/6a672503973bf7c687053e459bfff8a9652e16bf | Patch |
| https://github.com/kata-containers/kata-containers/releases/tag/3.27.0 | Product Release Notes |
| https://github.com/kata-containers/kata-containers/security/advisories/GHSA-wwj6-vghv-5p64 | Exploit Vendor Advisory |
Configurations
History
23 Feb 2026, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Katacontainers
Katacontainers kata Containers |
|
| CPE | cpe:2.3:a:katacontainers:kata_containers:*:*:*:*:*:*:*:* | |
| References | () https://github.com/kata-containers/kata-containers/commit/6a672503973bf7c687053e459bfff8a9652e16bf - Patch | |
| References | () https://github.com/kata-containers/kata-containers/releases/tag/3.27.0 - Product, Release Notes | |
| References | () https://github.com/kata-containers/kata-containers/security/advisories/GHSA-wwj6-vghv-5p64 - Exploit, Vendor Advisory |
19 Feb 2026, 17:24
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-19 17:24
Updated : 2026-02-23 20:15
NVD link : CVE-2026-24834
Mitre link : CVE-2026-24834
CVE.ORG link : CVE-2026-24834
JSON object : View
Products Affected
katacontainers
- kata_containers
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
