<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Kata-Containers/Kata-Containers (&lt; 0.0.0-20260422180503-1b9e49eb2763) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/kata-containers/kata-containers--0.0.0-20260422180503-1b9e49eb2763/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/kata-containers/kata-containers--0.0.0-20260422180503-1b9e49eb2763/feed.xml" rel="self" type="application/rss+xml"/><item><title>Kata Containers CopyFile Policy Subversion via Symlinks</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-kata-containers-copyfile-symlink/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-kata-containers-copyfile-symlink/</guid><description>An oversight in the CopyFile policy in Kata Containers allows untrusted hosts to write to arbitrary locations inside the guest workload image via symlinks, enabling binary overwrites and data exfiltration.</description><content:encoded><![CDATA[<p>An oversight in the CopyFile policy within Kata Containers allows a malicious host to manipulate guest workload images. The vulnerability stems from insufficient validation within the <code>CopyFileRequest</code> policy, specifically related to symlink creation. The policy primarily checks the destination path of copied files but fails to adequately validate the target of symlinks created via the same API. This flaw was discovered by @calonso-nv and impacts environments where the <code>genpolicy</code> implementation is used to prevent host access to container images, including Confidential Containers workloads which rely on strong isolation. If the guest image is not protected from the host (e.g., when using unprotected host pull), the system is not vulnerable. The affected package is <code>go/github.com/kata-containers/kata-containers</code> versions prior to <code>0.0.0-20260422180503-1b9e49eb2763</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target file within the guest container image, such as a binary or configuration file they wish to overwrite.</li>
<li>The attacker crafts a <code>CopyFileRequest</code> to create a symbolic link within the <code>/run/kata-containers/shared/containers</code> directory.</li>
<li>The <code>path</code> parameter of the request specifies the location of the symlink within the shared directory.</li>
<li>The <code>data</code> parameter of the request specifies the target of the symbolic link, which points to the target file identified in step 1, inside the guest file system.</li>
<li>The Kata Agent processes the <code>CopyFileRequest</code>, creating the symbolic link within the shared directory, pointing to the target file inside the container image.</li>
<li>The attacker crafts a second <code>CopyFileRequest</code> to copy malicious data into the symlink created in step 5.</li>
<li>The Kata Agent writes the malicious data to the symlink, which then overwrites the original target file within the container image.</li>
<li>The attacker restarts the container or waits for the compromised binary to be executed, achieving arbitrary code execution within the guest.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to overwrite arbitrary files within container images managed by Kata Containers. This can lead to arbitrary code execution within the guest environment, data exfiltration, and privilege escalation. This is particularly critical in Confidential Containers environments where the trust model explicitly forbids host access to container images. Affected systems are those employing the upstream <code>genpolicy</code> implementation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch or upgrade to <code>go/github.com/kata-containers/kata-containers</code> version <code>0.0.0-20260422180503-1b9e49eb2763</code> or later to address CVE-2026-41326.</li>
<li>Monitor the creation of symbolic links within the <code>/run/kata-containers/shared/containers</code> directory, using the provided Sigma rule, as this is an unusual operation (file_event).</li>
<li>Implement strict access controls and monitoring for the Kata Agent to prevent unauthorized <code>CopyFileRequest</code> messages.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>kata-containers</category><category>container-escape</category><category>symlink</category></item></channel></rss>