DEBIAN-CVE-2026-33542

Source
https://security-tracker.debian.org/tracker/CVE-2026-33542
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33542.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-33542
Upstream
  • CVE-2026-33542
Downstream
Published
2026-03-26T23:16:20.113Z
Modified
2026-03-31T08:02:04.087009Z
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Incus is a system container and virtual machine manager. Prior to version 6.23.0, a lack of validation of the image fingerprint when downloading from simplestreams image servers opens the door to image cache poisoning and under very narrow circumstances exposes other tenants to running attacker controlled images rather than the expected one. Version 6.23.0 patches the issue.

References

Affected packages

Debian:13 / incus

Package

Name
incus
Purl
pkg:deb/debian/incus?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.4-2+deb13u5

Affected versions

6.*
6.0.4-2
6.0.4-2+deb13u1~bpo12+1
6.0.4-2+deb13u1
6.0.4-2+deb13u2~bpo12+1
6.0.4-2+deb13u2
6.0.4-2+deb13u3~bpo12+1
6.0.4-2+deb13u3
6.0.4-2+deb13u4~bpo12+1
6.0.4-2+deb13u4
6.0.4-2+deb13u5~bpo12+1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33542.json"

Debian:14 / incus

Package

Name
incus
Purl
pkg:deb/debian/incus?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.6-2

Affected versions

6.*
6.0.4-2
6.0.4-3
6.0.5-1
6.0.5-2
6.0.5-3
6.0.5-4
6.0.5-5
6.0.5-6
6.0.5-7
6.0.5-8
6.0.6-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33542.json"

Debian:12 / lxd

Package

Name
lxd
Purl
pkg:deb/debian/lxd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.0.2-5
5.0.2-5+deb12u1
5.0.2-5+deb12u2
5.0.2-5+deb12u3
5.0.2-6
5.0.2+git20231211.1364ae4-1
5.0.2+git20231211.1364ae4-2
5.0.2+git20231211.1364ae4-3
5.0.2+git20231211.1364ae4-4
5.0.2+git20231211.1364ae4-5
5.0.2+git20231211.1364ae4-6
5.0.2+git20231211.1364ae4-7
5.0.2+git20231211.1364ae4-8
5.0.2+git20231211.1364ae4-9

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33542.json"

Debian:13 / lxd

Package

Name
lxd
Purl
pkg:deb/debian/lxd?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*
5.0.2+git20231211.1364ae4-9
5.0.2+git20231211.1364ae4-9+deb13u1
5.0.2+git20231211.1364ae4-9+deb13u2
5.0.2+git20231211.1364ae4-9+deb13u3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-33542.json"