CVE-2026-34179

NameCVE-2026-34179
DescriptionIn Canonical LXD versions 4.12 through 6.7, the doCertificateUpdate function in lxd/certificates.go does not validate the Type field when handling PUT/PATCH requests to /1.0/certificates/{fingerprint} for restricted TLS certificate users, allowing a remote authenticated attacker to escalate privileges to cluster admin.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-6212-1, DSA-6213-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
incus (PTS)trixie6.0.4-2+deb13u4vulnerable
trixie (security)6.0.4-2+deb13u6fixed
forky, sid6.0.6-3fixed
lxd (PTS)bookworm5.0.2-5+deb12u2vulnerable
bookworm (security)5.0.2-5+deb12u5fixed
trixie5.0.2+git20231211.1364ae4-9+deb13u3vulnerable
trixie (security)5.0.2+git20231211.1364ae4-9+deb13u5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
incussourcetrixie6.0.4-2+deb13u6DSA-6212-1
incussource(unstable)6.0.6-3
lxdsourcebookworm5.0.2-5+deb12u5DSA-6213-1
lxdsourcetrixie5.0.2+git20231211.1364ae4-9+deb13u5DSA-6213-1
lxdsource(unstable)(unfixed)

Notes

https://github.com/canonical/lxd/security/advisories/GHSA-c3h3-89qf-jqm5
https://github.com/canonical/lxd/pull/17936
https://github.com/canonical/lxd/commit/8c0c8dcc0f7b6ef59524bfeae198b6081248a88d
https://github.com/canonical/lxd/commit/5f4b8e20afa321e0be436a908a8a92b8b8700557
https://github.com/lxc/incus/pull/3068

Search for package or bug name: Reporting problems