Vulnerability Details CVE-2026-34178
In Canonical LXD before 6.8, the backup import path validates project restrictions against backup/index.yaml in the supplied tar archive but creates the instance from backup/container/backup.yaml, a separate file in the same archive that is never checked against project restrictions. An authenticated remote attacker with instance-creation permission in a restricted project can craft a backup archive where backup.yaml carries restricted settings such as security.privileged=true or raw.lxc directives, bypassing all project restriction enforcement and allowing full host compromise.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 16.2%
CVSS Severity
CVSS v3 Score 9.1
Products affected by CVE-2026-34178
-
cpe:2.3:a:canonical:lxd:4.12
-
cpe:2.3:a:canonical:lxd:4.13
-
cpe:2.3:a:canonical:lxd:4.14
-
cpe:2.3:a:canonical:lxd:4.15
-
cpe:2.3:a:canonical:lxd:4.16
-
cpe:2.3:a:canonical:lxd:4.17
-
cpe:2.3:a:canonical:lxd:4.18
-
cpe:2.3:a:canonical:lxd:4.19
-
cpe:2.3:a:canonical:lxd:4.20
-
cpe:2.3:a:canonical:lxd:4.21
-
cpe:2.3:a:canonical:lxd:4.22
-
cpe:2.3:a:canonical:lxd:4.23
-
cpe:2.3:a:canonical:lxd:4.24
-
cpe:2.3:a:canonical:lxd:5.0.0
-
cpe:2.3:a:canonical:lxd:5.0.1
-
cpe:2.3:a:canonical:lxd:5.0.2
-
cpe:2.3:a:canonical:lxd:5.0.3
-
cpe:2.3:a:canonical:lxd:5.0.4
-
cpe:2.3:a:canonical:lxd:5.0.5
-
cpe:2.3:a:canonical:lxd:5.21.0
-
cpe:2.3:a:canonical:lxd:5.21.1
-
cpe:2.3:a:canonical:lxd:5.21.2
-
cpe:2.3:a:canonical:lxd:5.21.3
-
cpe:2.3:a:canonical:lxd:5.21.4
-
cpe:2.3:a:canonical:lxd:6.0
-
cpe:2.3:a:canonical:lxd:6.1
-
cpe:2.3:a:canonical:lxd:6.2
-
cpe:2.3:a:canonical:lxd:6.3
-
cpe:2.3:a:canonical:lxd:6.4
-
cpe:2.3:a:canonical:lxd:6.5