CVE-2026-33743

Incus is a system container and virtual machine manager. Prior to version 6.23.0, a specially crafted storage bucket backup can be used by an user with access to Incus' storage bucket feature to crash the Incus daemon. Repeated use of this attack can be used to keep the server offline causing a denial of service of the control plane API. This does not impact any running workload, existing containers and virtual machines will keep operating. Version 6.23.0 fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxcontainers:incus:*:*:*:*:*:*:*:*

History

30 Mar 2026, 18:54

Type Values Removed Values Added
References () https://github.com/lxc/incus/security/advisories/GHSA-vg76-xmhg-j5x3 - () https://github.com/lxc/incus/security/advisories/GHSA-vg76-xmhg-j5x3 - Exploit, Vendor Advisory
CPE cpe:2.3:a:linuxcontainers:incus:*:*:*:*:*:*:*:*
First Time Linuxcontainers
Linuxcontainers incus

Information

Published : 2026-03-26 23:16

Updated : 2026-03-30 18:54


NVD link : CVE-2026-33743

Mitre link : CVE-2026-33743

CVE.ORG link : CVE-2026-33743


JSON object : View

Products Affected

linuxcontainers

  • incus
CWE
CWE-770

Allocation of Resources Without Limits or Throttling