Impact
A nil‑pointer dereference occurs in the backup metadata handling of Incus, allowing an authenticated user with bucket import privileges to crash the daemon by providing a malformed index.yaml that omits the required config block. This flaw is a classic null pointer dereference (CWE‑476) that terminates the service, rendering the system offline.
Affected Systems
Incus versions prior to 7.0.0 are affected. Users of the Incus system container and virtual machine manager who have access to the storage bucket import feature fall within the vulnerable scope.
Risk and Exploitability
The CVSS score is 7.1, indicating a high impact. EPSS data are not available, and the vulnerability is not listed in the CISA KEV catalog. The attack vector requires authenticated access to the bucket import functionality; an attacker can repeatedly trigger the crash to maintain a denial of service condition.
OpenCVE Enrichment
Debian DSA
Github GHSA