Impact
Incus, a system container and virtual machine manager, contains an out‑of‑bounds panic in its snapshot metadata handling. The flaw arises from an incorrect bounds check when indexing snapshot metadata arrays during backup import and migration. An attacker who can submit a backup archive with a tampered index file that does not contain the expected metadata entries causes the daemon to access beyond the end of a slice and crash. Repeated exploitation can keep the service unavailable, resulting in a denial‑of‑service attack. The vulnerability is classified as CWE‑129: Improper Validation of Array Index.
Affected Systems
The issue affects LXC Incus versions prior to 7.0.0. Users who have enabled the storage volume feature and can request the backup/restore interface are potentially vulnerable. The flaw is fixed in version 7.0.0 and later.
Risk and Exploitability
The CVSS v3 score of 7.1 indicates high severity. The EPSS score is not available, and the vulnerability is not listed in CISA KEV. The attack path requires authenticated access to the Incus backup/restore functionality, making the likely vector an authenticated vulnerability. Successful exploitation causes the daemon to crash, leading to denial of service. Applying the patch removes the crash vector and restores normal operation.
OpenCVE Enrichment
Debian DSA
Github GHSA