CVE-2026-33542

Incus is a system container and virtual machine manager. Prior to version 6.23.0, a lack of validation of the image fingerprint when downloading from simplestreams image servers opens the door to image cache poisoning and under very narrow circumstances exposes other tenants to running attacker controlled images rather than the expected one. Version 6.23.0 patches the issue.
References
Link Resource
https://github.com/lxc/incus/security/advisories/GHSA-p8mm-23gg-jc9r Exploit Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxcontainers:incus:*:*:*:*:*:*:*:*

History

30 Mar 2026, 18:48

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.8
CPE cpe:2.3:a:linuxcontainers:incus:*:*:*:*:*:*:*:*
References () https://github.com/lxc/incus/security/advisories/GHSA-p8mm-23gg-jc9r - () https://github.com/lxc/incus/security/advisories/GHSA-p8mm-23gg-jc9r - Exploit, Mitigation, Vendor Advisory
First Time Linuxcontainers
Linuxcontainers incus

Information

Published : 2026-03-26 23:16

Updated : 2026-03-30 18:48


NVD link : CVE-2026-33542

Mitre link : CVE-2026-33542

CVE.ORG link : CVE-2026-33542


JSON object : View

Products Affected

linuxcontainers

  • incus
CWE
CWE-295

Improper Certificate Validation