Unrated severityNVD Advisory· Published Mar 12, 2026· Updated Mar 13, 2026
Authenticated RCE via unsanitized compression_algorithm
CVE-2026-28384
Description
An improper sanitization of the compression_algorithm parameter in Canonical LXD allows an authenticated, unprivileged user to execute commands as the LXD daemon on the LXD server via API calls to the image and backup endpoints. This issue affected LXD from 4.12 through 6.6 and was fixed in the snap versions 5.0.6-e49d9f4 (channel 5.0/stable), 5.21.4-1374f39 (channel 5.21/stable), and 6.7-1f11451 (channel 6.0 stable). The channel 4.0/stable is not affected as it contains version 4.0.10.
Affected products
1- Range: 6.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/canonical/lxd/commit/043696a13171ace7dd4c2b32d34ce039ab629052mitrepatch
- github.com/canonical/lxd/commit/7046979645c2ce1b63b2f9e60ddf6cbc4c4b78f9mitrepatch
- github.com/canonical/lxd/commit/b7b411caf5c4971bfe2386c72128f44d7e2aaf4fmitrepatch
- github.com/canonical/lxd/security/advisories/GHSA-4rmf-rcp8-2r9gmitrevendor-advisory
- discourse.ubuntu.com/t/lxd-authenticated-remote-code-execution-fixes-available/78365mitremedia-coverage
News mentions
0No linked articles in our index yet.