Description
Canonical LXD versions 4.12 through 6.7 contain an incomplete denylist in isVMLowLevelOptionForbidden (lxd/project/limits/permissions.go), which omits raw.apparmor and raw.qemu.conf from the set of keys blocked under the restricted.virtual-machines.lowlevel=block project restriction. A remote attacker with can_edit permission on a VM instance in a restricted project can inject an AppArmor rule and a QEMU chardev configuration that bridges the LXD Unix socket into the guest VM, enabling privilege escalation to LXD cluster administrator and subsequently to host root.
Published: 2026-04-09
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Privilege Escalation
Action: Patch Now
AI Analysis

Impact

Canonical LXD includes an incomplete denylist that fails to block raw.apparmor and raw.qemu.conf options when the restricted.virtual-machines.lowlevel=block setting is enabled. An attacker who can edit a virtual machine in a restricted project can inject an AppArmor rule and a QEMU chardev configuration that forwards the LXD Unix socket into the guest, giving the attacker escalation power to the cluster administrator and ultimately host root. This weakness corresponds to CWE-184 and directly permits privilege escalation beyond the intended project boundaries.

Affected Systems

Canonical LXD versions 4.12 through 6.7 are impacted. Users running any of these releases should assess whether their environments use the restricted.virtual-machines.lowlevel=block project constraint and grant can_edit permissions on virtual machines.

Risk and Exploitability

The vulnerability carries a CVSS score of 9.1, indicating critical severity. While an EPSS score is not available, the high CVSS and lack of mitigation in affected releases suggest a strong likelihood of exploitation. A remote attacker only requires write permission on a VM within a restricted project to exploit the flaw, then can remotely inject configuration changes that give cluster administrator and finally host root access. The vulnerability is not listed in CISA’s KEV catalog, but the impact remains considerable for any system exposed to this misconfiguration.

Generated by OpenCVE AI on April 9, 2026 at 10:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Canonical LXD to a version that includes the denylist fix (>=6.8).
  • Remove any raw.apparmor or raw.qemu.conf settings from VM configurations in restricted projects as a temporary workaround.

Generated by OpenCVE AI on April 9, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6213-1 lxd security update
Github GHSA Github GHSA GHSA-fm2x-c5qw-4h6f LXD: VM lowlevel restriction bypass via raw.apparmor and raw.qemu.conf
History

Wed, 22 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:canonical:lxd:*:*:*:*:*:*:*:*

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Canonical
Canonical lxd
Vendors & Products Canonical
Canonical lxd

Thu, 09 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 09 Apr 2026 09:30:00 +0000

Type Values Removed Values Added
Description Canonical LXD versions 4.12 through 6.7 contain an incomplete denylist in isVMLowLevelOptionForbidden (lxd/project/limits/permissions.go), which omits raw.apparmor and raw.qemu.conf from the set of keys blocked under the restricted.virtual-machines.lowlevel=block project restriction. A remote attacker with can_edit permission on a VM instance in a restricted project can inject an AppArmor rule and a QEMU chardev configuration that bridges the LXD Unix socket into the guest VM, enabling privilege escalation to LXD cluster administrator and subsequently to host root.
Title VM lowlevel restriction bypass via raw.apparmor and raw.qemu.conf
Weaknesses CWE-184
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2026-04-09T12:12:48.251Z

Reserved: 2026-03-26T09:24:08.448Z

Link: CVE-2026-34177

cve-icon Vulnrichment

Updated: 2026-04-09T12:12:35.998Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T10:16:21.653

Modified: 2026-04-22T20:57:22.520

Link: CVE-2026-34177

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:33:03Z

Weaknesses