Incorrect Permission Assignment for Critical Resource Affecting azurefile-csi-1.31 package, versions <1.31.8-r8


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.01% (1st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-AZUREFILECSI131-15325084
  • published21 Feb 2026
  • disclosed19 Feb 2026

Introduced: 19 Feb 2026

CVE-2026-24834  (opens in a new tab)
CWE-732  (opens in a new tab)

How to fix?

Upgrade Chainguard azurefile-csi-1.31 to version 1.31.8-r8 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream azurefile-csi-1.31 package and not the azurefile-csi-1.31 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

Kata Containers is an open source project focusing on a standard implementation of lightweight Virtual Machines (VMs) that perform like containers. In versions prior to 3.27.0, an issue in Kata with Cloud Hypervisor allows a user of the container to modify the file system used by the Guest micro VM ultimately achieving arbitrary code execution as root in said VM. The current understanding is this doesn’t impact the security of the Host or of other containers / VMs running on that Host (note that arm64 QEMU lacks NVDIMM read-only support: It is believed that until the upstream QEMU gains this capability, a guest write could reach the image file). Version 3.27.0 patches the issue.

CVSS Base Scores

version 3.1