Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-64507

Опубликовано: 10 нояб. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 7.8

Описание

Incus is a system container and virtual machine manager. An issue in versions prior to 6.0.6 and 6.19.0 affects any Incus user in an environment where an unprivileged user may have root access to a container with an attached custom storage volume that has the security.shifted property set to true as well as access to the host as an unprivileged user. The most common case for this would be systems using incus-user with the less privileged incus group to provide unprivileged users with an isolated restricted access to Incus. Such users may be able to create a custom storage volume with the necessary property (depending on kernel and filesystem support) and can then write a setuid binary from within the container which can be executed as an unprivileged user on the host to gain root privileges. A patch for this issue is expected in versions 6.0.6 and 6.19.0. As a workaround, permissions can be manually restricted until a patched version of Incus is deployed.

РелизСтатусПримечание
devel

needs-triage

esm-apps/noble

needs-triage

jammy

DNE

noble

needs-triage

plucky

needs-triage

questing

needs-triage

upstream

released

6.0.5-4

Показывать по

EPSS

Процентиль: 6%
0.00025
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
2 месяца назад

Incus is a system container and virtual machine manager. An issue in versions prior to 6.0.6 and 6.19.0 affects any Incus user in an environment where an unprivileged user may have root access to a container with an attached custom storage volume that has the `security.shifted` property set to `true` as well as access to the host as an unprivileged user. The most common case for this would be systems using `incus-user` with the less privileged `incus` group to provide unprivileged users with an isolated restricted access to Incus. Such users may be able to create a custom storage volume with the necessary property (depending on kernel and filesystem support) and can then write a setuid binary from within the container which can be executed as an unprivileged user on the host to gain root privileges. A patch for this issue is expected in versions 6.0.6 and 6.19.0. As a workaround, permissions can be manually restricted until a patched version of Incus is deployed.

CVSS3: 7.8
debian
2 месяца назад

Incus is a system container and virtual machine manager. An issue in v ...

github
2 месяца назад

Incus vulnerable to local privilege escalation through custom storage volumes

CVSS3: 8.4
fstec
2 месяца назад

Уязвимость системы управления контейнерами и менеджера виртуальных машин Incus, связанная с небезопасным управлением привилегиями, позволяющая нарушителю повысить свои привилегии

CVSS3: 8.4
redos
около 1 месяца назад

Уязвимость incus

EPSS

Процентиль: 6%
0.00025
Низкий

7.8 High

CVSS3