Bug 2441025 (CVE-2026-24834)
| Summary: | CVE-2026-24834 containerd-shim-kata-v2: Kata Containers: Arbitrary code execution in guest virtual machine via file system modification | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
| Status: | NEW --- | QA Contact: | |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | unspecified | Keywords: | Security |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was found in Kata Containers. A user of a container can exploit this vulnerability by modifying the file system used by the Guest micro Virtual Machine (VM). This allows the attacker to achieve arbitrary code execution as root within the compromised Guest VM. This issue does not impact the security of the host or other containers/VMs running on the host.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2441145, 2441146 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2026-02-19 17:04:18 UTC
|