Incus is a system container and virtual machine manager. Prior to version 6.23.0, a specially crafted storage bucket backup can be used by an user with access to Incus' storage bucket feature to crash the Incus daemon. Repeated use of this attack can be used to keep the server offline causing a denial of service of the control plane API. This does not impact any running workload, existing containers and virtual machines will keep operating. Version 6.23.0 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/lxc/incus/security/advisories/GHSA-vg76-xmhg-j5x3 | Exploit Vendor Advisory |
| https://github.com/lxc/incus/security/advisories/GHSA-vg76-xmhg-j5x3 | Exploit Vendor Advisory |
Configurations
History
30 Mar 2026, 18:54
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/lxc/incus/security/advisories/GHSA-vg76-xmhg-j5x3 - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:linuxcontainers:incus:*:*:*:*:*:*:*:* | |
| First Time |
Linuxcontainers
Linuxcontainers incus |
Information
Published : 2026-03-26 23:16
Updated : 2026-03-30 18:54
NVD link : CVE-2026-33743
Mitre link : CVE-2026-33743
CVE.ORG link : CVE-2026-33743
JSON object : View
Products Affected
linuxcontainers
- incus
CWE
CWE-770
Allocation of Resources Without Limits or Throttling
