Nixpkgs Security Tracker

Login with GitHub

Details of issue NIXPKGS-2026-0776

NIXPKGS-2026-0776
published on 27 Mar 2026
Permalink CVE-2026-33743
6.5 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): HIGH
updated 1 day ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    3 packages
    • incus-ui-canonical
    • terraform-providers.incus
    • terraform-providers.lxc_incus
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Incus vulnerable to denial of source through crafted bucket backup file

Incus is a system container and virtual machine manager. Prior to version 6.23.0, a specially crafted storage bucket backup can be used by an user with access to Incus' storage bucket feature to crash the Incus daemon. Repeated use of this attack can be used to keep the server offline causing a denial of service of the control plane API. This does not impact any running workload, existing containers and virtual machines will keep operating. Version 6.23.0 fixes the issue.

Affected products

incus
  • ==< 6.23.0

Matching in nixpkgs

Ignored packages (3)

Package maintainers

Upstream advisory: https://github.com/lxc/incus/security/advisories/GHSA-vg76-xmhg-j5x3