NIXPKGS-2026-0776
GitHub issue
published on 27 Mar 2026
Permalink
CVE-2026-33743
6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
by @LeSuisse Activity log
- Created automatic suggestion
-
@LeSuisse
removed
3 packages
- incus-ui-canonical
- terraform-providers.incus
- terraform-providers.lxc_incus
- @LeSuisse accepted
- @LeSuisse published on GitHub
Incus vulnerable to denial of source through crafted bucket backup file
Incus is a system container and virtual machine manager. Prior to version 6.23.0, a specially crafted storage bucket backup can be used by an user with access to Incus' storage bucket feature to crash the Incus daemon. Repeated use of this attack can be used to keep the server offline causing a denial of service of the control plane API. This does not impact any running workload, existing containers and virtual machines will keep operating. Version 6.23.0 fixes the issue.
References
- https://github.com/lxc/incus/security/advisories/GHSA-vg76-xmhg-j5x3 x_refsource_CONFIRM
Affected products
incus
- ==< 6.23.0
Matching in nixpkgs
pkgs.incus
Powerful system container and virtual machine manager
Ignored packages (3)
pkgs.incus-ui-canonical
Web user interface for Incus
pkgs.terraform-providers.incus
None
Package maintainers
-
@jnsgruk Jon Seager <jon@sgrs.uk>
-
@megheaiulian Meghea Iulian <iulian.meghea@gmail.com>
-
@adamcstephens Adam C. Stephens <happy.plan4249@valkor.net>
-
@mkg20001 Maciej Krüger <mkg20001+nix@gmail.com>
-
@aanderse Aaron Andersen <aaron@fosslib.net>