CVE-2026-41648

EUVD-2026-28372
Incus is a system container and virtual machine manager. Prior to version 7.0.0, user provided image and backup tarballs would be unpacked and YAML files parsed without any size restrictions. This was making it easy for an authenticated user to provide a crafted image or backup tarball that when parsed by Incus would lead to a very large YAML document being loaded into memory, potentially causing the entire server to run out of memory. This issue has been patched in version 7.0.0.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 13%
Affected Products (NVD)
VendorProductVersion
linuxcontainersincus
𝑥
< 7.0.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
incus
forky
vulnerable
sid
7.0.0-1
fixed
trixie
vulnerable
trixie (security)
6.0.4-2+deb13u7
fixed
lxd
bookworm
vulnerable
bookworm (security)
5.0.2-5+deb12u6
fixed
trixie
vulnerable
trixie (security)
5.0.2+git20231211.1364ae4-9+deb13u6
fixed