Untriaged
Permalink
CVE-2026-33743
6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Incus vulnerable to denial of source through crafted bucket backup file
Incus is a system container and virtual machine manager. Prior to version 6.23.0, a specially crafted storage bucket backup can be used by an user with access to Incus' storage bucket feature to crash the Incus daemon. Repeated use of this attack can be used to keep the server offline causing a denial of service of the control plane API. This does not impact any running workload, existing containers and virtual machines will keep operating. Version 6.23.0 fixes the issue.
References
-
https://github.com/lxc/incus/security/advisories/GHSA-vg76-xmhg-j5x3 x_refsource_CONFIRM
Affected products
incus
- ==< 6.23.0
Matching in nixpkgs
pkgs.incus
Powerful system container and virtual machine manager
pkgs.incus-lts
Powerful system container and virtual machine manager
pkgs.incus-ui-canonical
Web user interface for Incus
pkgs.terraform-providers.incus
None
Package maintainers
-
@mkg20001 Maciej Krüger <mkg20001+nix@gmail.com>
-
@megheaiulian Meghea Iulian <iulian.meghea@gmail.com>
-
@jnsgruk Jon Seager <jon@sgrs.uk>
-
@aanderse Aaron Andersen <aaron@fosslib.net>
-
@adamcstephens Adam C. Stephens <happy.plan4249@valkor.net>