Impact
The vulnerability occurs when Incus processes a backup archive containing a valid inline backup/index.yaml but a malformed legacy backup/container/backup.yaml file. During the import flow the archive is extracted and the legacy file is reparsed, causing ParseConfigYamlFile() to produce a config structure without a container section. Downstream components then dereference this nil container, which results in a crash of the Incus daemon. The affected CWE is 476 (Null Pointer Dereference). The primary impact is a denial of service against the Incus service, leading to temporary unavailability of containers or VMs until the daemon is restarted.
Affected Systems
All Incus installations using versions prior to 7.0.0 are affected. This includes the 'lxc:incus' product family. No additional version matrix is available beyond the pre-7.0.0 cutoff.
Risk and Exploitability
The CVSS base score is 6.5, representing a moderate severity. The EPSS score is not available, which means current data does not provide a concrete exploitation probability, but the absence of a KEV listing further indicates no confirmed public exploitation. The attack vector requires an authenticated user with permission to import instance backups; such a user can craft a backup archive that trips the crash during the restore path after extraction has begun. The crash causes the Incus daemon to terminate, requiring a restart and temporarily denying service to all containers managed by that instance.
OpenCVE Enrichment
Debian DSA
Github GHSA