CVE-2026-34178
Description
In Canonical LXD before 6.8, the backup import path validates project restrictions against backup/index.yaml in the supplied tar archive but creates the instance from backup/container/backup.yaml, a separate file in the same archive that is never checked against project restrictions. An authenticated remote attacker with instance-creation permission in a restricted project can craft a backup archive where backup.yaml carries restricted settings such as security.privileged=true or raw.lxc directives, bypassing all project restriction enforcement and allowing full host compromise.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/canonical/lxdGo | >= 0.0.0-20210305023314-538ac3df036e, <= 0.0.0-20260226085519-736f34afb267 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-q96j-3fmm-7fv4ghsaADVISORY
- github.com/canonical/lxd/security/advisories/GHSA-q96j-3fmm-7fv4nvdThird Party AdvisoryExploitWEB
- nvd.nist.gov/vuln/detail/CVE-2026-34178ghsaADVISORY
- github.com/canonical/lxd/pull/17921nvdIssue TrackingWEB
News mentions
0No linked articles in our index yet.