TopVuln

High-risk vulnerability digests

CVE-2026-24054

  • HIGH

OESA-2026-1599 kata-containers-go security update

Details

CVSS v3
10.0
CVSS v4
8.8
NVD published
2026-01-29 18:16:15
EPSS
<0.1% probability · 25.6th percentile — 2026-03-14
Affected versions
cpe:2.3:a:katacontainers:kata_containers:*:*:*:*:*:*:*:*
Summary
Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.26.0, when a container image is malformed or contains no layers, containerd falls back to bind-mounting an empty snapshotter directory for the container rootfs. When the Kata runtime attempts to mount the container rootfs, the bind mount causes the rootfs to be detected as a block device, leading to the underlying device being hotplugged to the guest. This can cause filesystem-level errors on the host due to double inode allocation, and may lead to the host's block device being mounted as read-only. Version 3.26.0 contains a patch for the issue.
Remediation
Not available in our cache.
Exploit info
https://github.com/kata-containers/kata-containers/security/advisories/GHSA-5fc8-gg7w-3g5c

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.