<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Docker/Docker (&lt;= 28.5.2) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/docker/docker--28.5.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 17:54:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/docker/docker--28.5.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>Docker Race Condition Allows Bind Mount Redirection to Host Path (CVE-2026-42306)</title><link>https://feed.craftedsignal.io/briefs/2026-05-docker-bind-mount-redirection/</link><pubDate>Mon, 18 May 2026 17:54:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-docker-bind-mount-redirection/</guid><description>A race condition in Docker's `docker cp` command allows a malicious container to redirect a bind mount target to an arbitrary host path by manipulating symlinks during the setup of temporary filesystem views, potentially overwriting host files or causing denial of service.</description><content:encoded><![CDATA[<p>A race condition vulnerability exists in Docker&rsquo;s <code>docker cp</code> command related to the setup of temporary filesystem views when copying files into a container. This flaw, identified as CVE-2026-42306, allows a malicious container to redirect a bind mount target to an arbitrary host path. The vulnerability occurs because, during the setup, a process inside the container can replace the mount destination with a symlink pointing to the host before the mount syscall completes. This can lead to overwriting host files with the volume&rsquo;s contents or causing denial of service by masking the host path. This vulnerability affects <code>docker/docker</code> versions up to 28.5.2 and <code>moby/moby</code> versions up to 28.5.2 and versions of <code>moby/moby/v2</code> prior to 2.0.0-beta.14.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A container with at least one volume mount is created.</li>
<li>A malicious process within the container gains the ability to rapidly create and swap symlinks at the volume mount destination path.</li>
<li>The attacker identifies a target host path for redirection.</li>
<li>The attacker prepares malicious content to overwrite the host path.</li>
<li>An operator initiates a <code>docker cp</code> command to copy files into the container.</li>
<li>Before the <code>mount()</code> syscall completes, the malicious process replaces the mount destination with a symlink pointing to the attacker-controlled host path.</li>
<li>The <code>mount()</code> syscall follows the symlink, and the volume is bind-mounted to the attacker-controlled host path.</li>
<li>Depending on the volume content and permissions, either the host files are overwritten, or the host path is masked, potentially leading to denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this race condition (CVE-2026-42306) allows a malicious container to redirect a volume bind mount to an arbitrary host path. If the volume is writable, arbitrary host files at the redirected path could be overwritten, leading to data corruption or system compromise. If the volume is read-only, the host path is masked by the mount, causing a denial of service. While the mount is temporary and torn down after the <code>docker cp</code> completes, the effects of any writes persist.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to patched versions of <code>go/github.com/docker/docker</code> and <code>go/github.com/moby/moby</code> to address CVE-2026-42306.</li>
<li>Only run containers from trusted images to minimize the risk of malicious processes exploiting the vulnerability.</li>
<li>Avoid using <code>docker cp</code> with untrusted running containers to prevent unintended bind mount redirection.</li>
<li>Implement authorization plugins to restrict access to the archive API endpoints (<code>PUT /containers/{id}/archive</code>, <code>HEAD /containers/{id}/archive</code>) as a workaround.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>privilege-escalation</category><category>defense-evasion</category><category>docker</category></item></channel></rss>