← Volver a CVEs
CVE-2026-34178
CRITICAL9.1
Descripcion
In Canonical LXD before 6.8, the backup import path validates project restrictions against backup/index.yaml in the supplied tar archive but creates the instance from backup/container/backup.yaml, a separate file in the same archive that is never checked against project restrictions. An authenticated remote attacker with instance-creation permission in a restricted project can craft a backup archive where backup.yaml carries restricted settings such as security.privileged=true or raw.lxc directives, bypassing all project restriction enforcement and allowing full host compromise.
Detalles CVE
Puntuacion CVSS v3.19.1
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosHIGH
Interaccion usuarioNONE
Publicado4/9/2026
Ultima modificacion4/13/2026
Fuentenvd
Avistamientos honeypot0
Debilidades (CWE)
CWE-20
Referencias
https://github.com/canonical/lxd/pull/17921(security@ubuntu.com)
https://github.com/canonical/lxd/security/advisories/GHSA-q96j-3fmm-7fv4(security@ubuntu.com)
https://github.com/canonical/lxd/security/advisories/GHSA-q96j-3fmm-7fv4(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.