| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-q4q8-7f2j-9h9f | Incus has an abitrary file write through its systemd-creds options |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 27 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lxc
Lxc incus |
|
| Vendors & Products |
Lxc
Lxc incus |
Fri, 27 Mar 2026 04:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Incus is a system container and virtual machine manager. Incus instances have an option to provide credentials to systemd in the guest. For containers, this is handled through a shared directory. Prior to version 6.23.0, an attacker can set a configuration key named something like `systemd.credential.../../../../../../root/.bashrc` to cause Incus to write outside of the `credentials` directory associated with the container. This makes use of the fact that the Incus syntax for such credentials is `systemd.credential.XYZ` where `XYZ` can itself contain more periods. While it's not possible to read any data this way, it's possible to write to arbitrary files as root, enabling both privilege escalation and denial of service attacks. Version 6.23.0 fixes the issue. | |
| Title | Abitrary file write through systemd-creds option | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-27T20:00:08.359Z
Reserved: 2026-03-24T19:50:52.105Z
Link: CVE-2026-33945
Updated: 2026-03-27T14:09:50.207Z
Status : Received
Published: 2026-03-27T00:16:23.633
Modified: 2026-03-27T00:16:23.633
Link: CVE-2026-33945
OpenCVE Enrichment
Updated: 2026-03-27T09:22:47Z
Github GHSA