<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Moby/Moby (&lt;= 28.5.2) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/moby/moby--28.5.2/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 17:54:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/moby/moby--28.5.2/feed.xml" rel="self" type="application/rss+xml"/><item><title>Docker Race Condition Allows Bind Mount Redirection to Host Path (CVE-2026-42306)</title><link>https://feed.craftedsignal.io/briefs/2026-05-docker-bind-mount-redirection/</link><pubDate>Mon, 18 May 2026 17:54:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-docker-bind-mount-redirection/</guid><description>A race condition in Docker's `docker cp` command allows a malicious container to redirect a bind mount target to an arbitrary host path by manipulating symlinks during the setup of temporary filesystem views, potentially overwriting host files or causing denial of service.</description><content:encoded><![CDATA[<p>A race condition vulnerability exists in Docker&rsquo;s <code>docker cp</code> command related to the setup of temporary filesystem views when copying files into a container. This flaw, identified as CVE-2026-42306, allows a malicious container to redirect a bind mount target to an arbitrary host path. The vulnerability occurs because, during the setup, a process inside the container can replace the mount destination with a symlink pointing to the host before the mount syscall completes. This can lead to overwriting host files with the volume&rsquo;s contents or causing denial of service by masking the host path. This vulnerability affects <code>docker/docker</code> versions up to 28.5.2 and <code>moby/moby</code> versions up to 28.5.2 and versions of <code>moby/moby/v2</code> prior to 2.0.0-beta.14.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A container with at least one volume mount is created.</li>
<li>A malicious process within the container gains the ability to rapidly create and swap symlinks at the volume mount destination path.</li>
<li>The attacker identifies a target host path for redirection.</li>
<li>The attacker prepares malicious content to overwrite the host path.</li>
<li>An operator initiates a <code>docker cp</code> command to copy files into the container.</li>
<li>Before the <code>mount()</code> syscall completes, the malicious process replaces the mount destination with a symlink pointing to the attacker-controlled host path.</li>
<li>The <code>mount()</code> syscall follows the symlink, and the volume is bind-mounted to the attacker-controlled host path.</li>
<li>Depending on the volume content and permissions, either the host files are overwritten, or the host path is masked, potentially leading to denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this race condition (CVE-2026-42306) allows a malicious container to redirect a volume bind mount to an arbitrary host path. If the volume is writable, arbitrary host files at the redirected path could be overwritten, leading to data corruption or system compromise. If the volume is read-only, the host path is masked by the mount, causing a denial of service. While the mount is temporary and torn down after the <code>docker cp</code> completes, the effects of any writes persist.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to patched versions of <code>go/github.com/docker/docker</code> and <code>go/github.com/moby/moby</code> to address CVE-2026-42306.</li>
<li>Only run containers from trusted images to minimize the risk of malicious processes exploiting the vulnerability.</li>
<li>Avoid using <code>docker cp</code> with untrusted running containers to prevent unintended bind mount redirection.</li>
<li>Implement authorization plugins to restrict access to the archive API endpoints (<code>PUT /containers/{id}/archive</code>, <code>HEAD /containers/{id}/archive</code>) as a workaround.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>privilege-escalation</category><category>defense-evasion</category><category>docker</category></item><item><title>Docker `PUT /containers/{id}/archive` Vulnerability Allows Host Root Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-docker-archive-rce/</link><pubDate>Mon, 18 May 2026 17:47:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-docker-archive-rce/</guid><description>A vulnerability exists in Docker where a malicious container image can execute arbitrary code with host root privileges by exploiting the decompression of compressed archives uploaded via the `PUT /containers/{id}/archive` endpoint, tracked as CVE-2026-41567.</description><content:encoded><![CDATA[<p>A vulnerability, identified as CVE-2026-41567, exists in Docker related to the handling of compressed archives uploaded via the <code>PUT /containers/{id}/archive</code> endpoint. When a user uploads a compressed archive into a container, a malicious image can execute arbitrary code with daemon (host root) privileges. The vulnerability stems from the Docker daemon incorrectly resolving decompression binaries from the container&rsquo;s filesystem instead of the host&rsquo;s when handling <code>PUT /containers/{id}/archive</code> requests with compressed archives. This allows a container image containing a trojanized decompression binary (e.g., xz or gzip) to achieve code execution as the daemon process whenever a compressed archive is uploaded to that container. This issue affects Docker versions up to 28.5.2, moby/moby versions up to 28.5.2, and go/github.com/moby/moby/v2 versions prior to 2.0.0-beta.14.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Docker image containing a trojanized decompression binary (e.g., <code>xz</code> or <code>gzip</code>).</li>
<li>The attacker deploys the malicious Docker image to a system.</li>
<li>A user runs a container from the malicious image.</li>
<li>The user uploads a compressed archive (either xz or gzip) into the container. This can be achieved by piping a compressed archive via <code>docker cp -</code> or by calling the <code>PUT /containers/{id}/archive</code> API directly with compressed content.</li>
<li>When processing the <code>PUT /containers/{id}/archive</code> request, the Docker daemon attempts to decompress the archive.</li>
<li>Due to the vulnerability, the Docker daemon executes the trojanized decompression binary from within the container&rsquo;s filesystem instead of using a trusted host binary.</li>
<li>The trojanized decompression binary executes arbitrary code with the privileges of the Docker daemon, which includes host root privileges.</li>
<li>The attacker gains control of the host system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to arbitrary code execution as host root, effectively bypassing the container-to-host trust boundary. This allows an attacker to gain full control of the host system, potentially leading to data exfiltration, system compromise, or other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Docker version 28.5.3 or later to remediate CVE-2026-41567.</li>
<li>Apply available patches for <code>go/github.com/moby/moby/v2</code> before version 2.0.0-beta.14 to remediate CVE-2026-41567.</li>
<li>Implement authorization plugins to restrict access to the <code>PUT /containers/{id}/archive</code> endpoint, as recommended in the overview.</li>
<li>Avoid piping compressed archives into containers created from untrusted images, as discussed in the conditions for exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>docker</category><category>container</category><category>rce</category><category>privilege-escalation</category><category>CVE-2026-41567</category></item></channel></rss>