← Back to CVEs
CVE-2026-34178
CRITICAL9.1
Description
In Canonical LXD before 6.8, the backup import path validates project restrictions against backup/index.yaml in the supplied tar archive but creates the instance from backup/container/backup.yaml, a separate file in the same archive that is never checked against project restrictions. An authenticated remote attacker with instance-creation permission in a restricted project can craft a backup archive where backup.yaml carries restricted settings such as security.privileged=true or raw.lxc directives, bypassing all project restriction enforcement and allowing full host compromise.
CVE Details
CVSS v3.1 Score9.1
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published4/9/2026
Last Modified4/13/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-20
References
https://github.com/canonical/lxd/pull/17921(security@ubuntu.com)
https://github.com/canonical/lxd/security/advisories/GHSA-q96j-3fmm-7fv4(security@ubuntu.com)
https://github.com/canonical/lxd/security/advisories/GHSA-q96j-3fmm-7fv4(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.