Impact
A specially crafted storage‑bucket backup file can cause the Incus daemon to crash. The crash disables the control plane API, resulting in a denial of service for users. The failure does not affect already‑running containers or virtual machines, and the loss of service can persist until the daemon is restarted. The weakness arises from improper handling of user‑supplied data and unchecked memory allocation, corresponding to CWE‑1286 and CWE‑770.
Affected Systems
The vulnerability affects LinuxContainers’ Incus system container and virtual machine manager, all releases older than version 6.23.0. Any user who can access the storage‑bucket feature – either locally or remotely – can trigger the crash. The issue is limited to the Incus daemon; the underlying workloads are unaffected.
Risk and Exploitability
The CVSS base score of 6.5 indicates medium severity. The EPSS score of less than 1 % suggests a low likelihood of widespread exploitation, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to submit a crafted backup via the storage‑bucket API, which typically requires user privileges. Repeated use can keep the control plane offline, but the impact is confined to service availability rather than confidentiality or integrity.
OpenCVE Enrichment
Debian DSA
Github GHSA