CVE-2026-34178 PUBLISHED

Importing a crafted backup leads to project restriction bypass

Assigner: canonical
Reserved: 26.03.2026 Published: 09.04.2026 Updated: 09.04.2026

In Canonical LXD before 6.8, the backup import path validates project restrictions against backup/index.yaml in the supplied tar archive but creates the instance from backup/container/backup.yaml, a separate file in the same archive that is never checked against project restrictions. An authenticated remote attacker with instance-creation permission in a restricted project can craft a backup archive where backup.yaml carries restricted settings such as security.privileged=true or raw.lxc directives, bypassing all project restriction enforcement and allowing full host compromise.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS Score: 9.1

Product Status

Vendor Canonical
Product lxd
Versions Default: unaffected
  • affected from 4.12.0 to 5.0.7 (excl.)
  • affected from 5.1.0 to 5.21.5 (excl.)
  • affected from 6.0.0 to 6.8.0 (excl.)

Credits

  • Miha Purg finder

References

Problem Types

  • CWE-20 Improper input validation CWE