Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6213-1 | lxd security update |
Github GHSA |
GHSA-fm2x-c5qw-4h6f | LXD: VM lowlevel restriction bypass via raw.apparmor and raw.qemu.conf |
Wed, 22 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:canonical:lxd:*:*:*:*:*:*:*:* |
Fri, 10 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical lxd |
|
| Vendors & Products |
Canonical
Canonical lxd |
Thu, 09 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Apr 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Canonical LXD versions 4.12 through 6.7 contain an incomplete denylist in isVMLowLevelOptionForbidden (lxd/project/limits/permissions.go), which omits raw.apparmor and raw.qemu.conf from the set of keys blocked under the restricted.virtual-machines.lowlevel=block project restriction. A remote attacker with can_edit permission on a VM instance in a restricted project can inject an AppArmor rule and a QEMU chardev configuration that bridges the LXD Unix socket into the guest VM, enabling privilege escalation to LXD cluster administrator and subsequently to host root. | |
| Title | VM lowlevel restriction bypass via raw.apparmor and raw.qemu.conf | |
| Weaknesses | CWE-184 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-09T12:12:48.251Z
Reserved: 2026-03-26T09:24:08.448Z
Link: CVE-2026-34177
Updated: 2026-04-09T12:12:35.998Z
Status : Analyzed
Published: 2026-04-09T10:16:21.653
Modified: 2026-04-22T20:57:22.520
Link: CVE-2026-34177
No data.
OpenCVE Enrichment
Updated: 2026-04-10T09:33:03Z
Debian DSA
Github GHSA