← Zuruck zu CVEs
CVE-2026-34178
CRITICAL9.1
Beschreibung
In Canonical LXD before 6.8, the backup import path validates project restrictions against backup/index.yaml in the supplied tar archive but creates the instance from backup/container/backup.yaml, a separate file in the same archive that is never checked against project restrictions. An authenticated remote attacker with instance-creation permission in a restricted project can craft a backup archive where backup.yaml carries restricted settings such as security.privileged=true or raw.lxc directives, bypassing all project restriction enforcement and allowing full host compromise.
CVE Details
CVSS v3.1 Bewertung9.1
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienHIGH
BenutzerinteraktionNONE
Veroffentlicht4/9/2026
Zuletzt geandert4/13/2026
Quellenvd
Honeypot-Sichtungen0
Schwachen (CWE)
CWE-20
Referenzen
https://github.com/canonical/lxd/pull/17921(security@ubuntu.com)
https://github.com/canonical/lxd/security/advisories/GHSA-q96j-3fmm-7fv4(security@ubuntu.com)
https://github.com/canonical/lxd/security/advisories/GHSA-q96j-3fmm-7fv4(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.