CVE-2025-54288

NameCVE-2025-54288
DescriptionInformation Spoofing in devLXD Server in Canonical LXD versions 4.0 and above on Linux container platforms allows attackers with root privileges within any container to impersonate other containers and obtain their metadata, configuration, and device information via spoofed process names in the command line.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-6027-1, DSA-6028-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
incus (PTS)trixie6.0.4-2vulnerable
trixie (security)6.0.4-2+deb13u1fixed
forky6.0.5-1fixed
sid6.0.5-3fixed
lxd (PTS)bookworm5.0.2-5vulnerable
bookworm (security)5.0.2-5+deb12u1fixed
trixie5.0.2+git20231211.1364ae4-9vulnerable
trixie (security)5.0.2+git20231211.1364ae4-9+deb13u1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
incussourcetrixie6.0.4-2+deb13u1DSA-6027-1
incussource(unstable)6.0.5-1
lxdsourcebookworm5.0.2-5+deb12u1DSA-6028-1
lxdsourcetrixie5.0.2+git20231211.1364ae4-9+deb13u1DSA-6028-1
lxdsource(unstable)(unfixed)

Notes

https://github.com/canonical/lxd/security/advisories/GHSA-7232-97c6-j525

Search for package or bug name: Reporting problems