Moderate severityNVD Advisory· Published Oct 2, 2025· Updated Oct 2, 2025
Source Container Identification Vulnerability via cmdline Spoofing in devLXD Server
CVE-2025-54288
Description
Information Spoofing in devLXD Server in Canonical LXD versions 4.0 and above on Linux container platforms allows attackers with root privileges within any container to impersonate other containers and obtain their metadata, configuration, and device information via spoofed process names in the command line.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/canonical/lxdGo | >= 4.0, < 5.21.4 | 5.21.4 |
github.com/canonical/lxdGo | >= 6.0, < 6.5 | 6.5 |
github.com/canonical/lxdGo | >= 0.0.0-20200331193331-03aab09f5b5c, < 0.0.0-20250827065555-0494f5d47e41 | 0.0.0-20250827065555-0494f5d47e41 |
Affected products
1- Range: 6.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.