<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-41567 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-41567/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 17:47:42 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-41567/feed.xml" rel="self" type="application/rss+xml"/><item><title>Docker `PUT /containers/{id}/archive` Vulnerability Allows Host Root Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-docker-archive-rce/</link><pubDate>Mon, 18 May 2026 17:47:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-docker-archive-rce/</guid><description>A vulnerability exists in Docker where a malicious container image can execute arbitrary code with host root privileges by exploiting the decompression of compressed archives uploaded via the `PUT /containers/{id}/archive` endpoint, tracked as CVE-2026-41567.</description><content:encoded><![CDATA[<p>A vulnerability, identified as CVE-2026-41567, exists in Docker related to the handling of compressed archives uploaded via the <code>PUT /containers/{id}/archive</code> endpoint. When a user uploads a compressed archive into a container, a malicious image can execute arbitrary code with daemon (host root) privileges. The vulnerability stems from the Docker daemon incorrectly resolving decompression binaries from the container&rsquo;s filesystem instead of the host&rsquo;s when handling <code>PUT /containers/{id}/archive</code> requests with compressed archives. This allows a container image containing a trojanized decompression binary (e.g., xz or gzip) to achieve code execution as the daemon process whenever a compressed archive is uploaded to that container. This issue affects Docker versions up to 28.5.2, moby/moby versions up to 28.5.2, and go/github.com/moby/moby/v2 versions prior to 2.0.0-beta.14.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious Docker image containing a trojanized decompression binary (e.g., <code>xz</code> or <code>gzip</code>).</li>
<li>The attacker deploys the malicious Docker image to a system.</li>
<li>A user runs a container from the malicious image.</li>
<li>The user uploads a compressed archive (either xz or gzip) into the container. This can be achieved by piping a compressed archive via <code>docker cp -</code> or by calling the <code>PUT /containers/{id}/archive</code> API directly with compressed content.</li>
<li>When processing the <code>PUT /containers/{id}/archive</code> request, the Docker daemon attempts to decompress the archive.</li>
<li>Due to the vulnerability, the Docker daemon executes the trojanized decompression binary from within the container&rsquo;s filesystem instead of using a trusted host binary.</li>
<li>The trojanized decompression binary executes arbitrary code with the privileges of the Docker daemon, which includes host root privileges.</li>
<li>The attacker gains control of the host system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to arbitrary code execution as host root, effectively bypassing the container-to-host trust boundary. This allows an attacker to gain full control of the host system, potentially leading to data exfiltration, system compromise, or other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to Docker version 28.5.3 or later to remediate CVE-2026-41567.</li>
<li>Apply available patches for <code>go/github.com/moby/moby/v2</code> before version 2.0.0-beta.14 to remediate CVE-2026-41567.</li>
<li>Implement authorization plugins to restrict access to the <code>PUT /containers/{id}/archive</code> endpoint, as recommended in the overview.</li>
<li>Avoid piping compressed archives into containers created from untrusted images, as discussed in the conditions for exploitation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>docker</category><category>container</category><category>rce</category><category>privilege-escalation</category><category>CVE-2026-41567</category></item></channel></rss>