Debian Package Tracker
Register | Log in
Subscribe

incus

Modern container and virtual machine manager - daemon

Choose email to subscribe with

general
  • source: incus (main)
  • version: 7.0.0-1
  • maintainer: Debian Go Packaging Team (DMD)
  • uploaders: Free Ekanayaka [DMD] – Mathias Gibbens [DMD]
  • arch: all any
  • std-ver: 4.7.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • old-bpo: 6.0.4-2+deb13u7~bpo12+1
  • stable: 6.0.4-2+deb13u7
  • stable-sec: 6.0.4-2+deb13u7
  • testing: 6.0.6-3
  • unstable: 7.0.0-1
versioned links
  • 6.0.4-2+deb13u7~bpo12+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.0.4-2+deb13u7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.0.6-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 7.0.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • golang-github-lxc-incus-dev
  • incus (2 bugs: 0, 2, 0, 0)
  • incus-agent
  • incus-base
  • incus-client
  • incus-extra
action needed
Marked for autoremoval on 17 June: #1135644 high
Version 6.0.6-3 of incus is marked for autoremoval from testing on Wed 17 Jun 2026. It is affected by #1135644. The removal of incus will also cause the removal of (transitive) reverse dependencies: distrobuilder, incant. You should try to prevent the removal by fixing these RC bugs.
Created: 2026-05-11 Last update: 2026-05-16 21:04
9 security issues in forky high

There are 9 open security issues in forky.

9 important issues:
  • CVE-2026-35527: Incus is an open source container and virtual machine manager. In versions prior to 7.0.0, the image import flow issues an outbound HEAD request to a user-supplied URL before validating the request against project restrictions such as restricted.images.servers. The imgPostURLInfo function constructs and sends a HEAD request directly from the attacker-supplied source URL to resolve image metadata, and this network interaction occurs before the flow reaches the point where the import would be rejected by policy. Although the actual image download is blocked by the project restriction, an authenticated user can coerce the daemon into making blind HEAD requests to arbitrary destinations. These requests include server metadata in custom headers (Incus-Server-Architectures, Incus-Server-Version), which discloses information about the host environment to the attacker-controlled endpoint. This blind SSRF primitive can be used to probe internal services, unroutable address space, or cloud metadata endpoints reachable from the host. This vulnerability pattern is similar to CVE-2026-24767. This issue has been fixed in version 7.0.0.
  • CVE-2026-40195: Incus is a system container and virtual machine manager. In versions before 7.0.0, missing validation logic in the storage bucket import logic allows an authenticated user with access to the storage bucket feature to cause the Incus daemon to crash. The vulnerability is present in the backup metadata handling logic, where the daemon processes the index.yaml file from an imported archive and accesses members of the parsed backup configuration without first verifying that the configuration object was initialized. A malicious or malformed index.yaml that omits the config block causes a nil-pointer dereference during bucket import operations and terminates the daemon. Repeated use of this issue can be used to keep Incus offline, causing a denial of service. This issue is fixed in version 7.0.0.
  • CVE-2026-40197: Incus is a system container and virtual machine manager. In versions before 7.0.0, missing validation logic in the storage volume import logic allows an authenticated user with access to the storage volume feature to cause the Incus daemon to crash. The custom volume backup import subsystem contains a nil-pointer dereference vulnerability during import operations. In the snapshot import loop, the daemon iterates over entries from `srcBackup.Config.VolumeSnapshots` and assumes that each slice element is initialized, then dereferences fields such as `Name`, `Config`, `Description`, `CreatedAt`, and `ExpiresAt` without first validating the element itself. Because the yaml unmarshaler accepts explicit null array elements from an attacker-controlled index.yaml and converts them into nil pointers inside the slice, an attacker can supply a backup archive containing a null entry in the volume_snapshots array. This causes a nil-pointer dereference during custom volume import and terminates the daemon, resulting in denial of service on the affected node. Repeated use of this issue can be used to keep Incus offline, causing a denial of service. This issue is fixed in version 7.0.0.
  • CVE-2026-40243: Incus is a system container and virtual machine manager. In versions before 7.0.0, broken TLS validation logic in the OVN database connection logic can allow connections to an attacker's OVN database. The OVN client implementations disable Go standard TLS server verification and replace it with custom peer-certificate verification logic. That replacement verifier does not anchor trust in the configured CA certificate. Instead, it constructs the verification root set from certificates supplied by the peer during the handshake, so the configured CA is parsed but not used as the trust anchor for the final verification decision. In OVN-enabled deployments that use these SSL database connection paths, an attacker able to impersonate or intercept the OVN endpoint on the management network can present a rogue self-signed certificate chain, and Incus will accept this certificate as valid. This issue defeats the intended CA-based trust model for OVN database connections and permits endpoint impersonation by an active attacker in a suitable network position. This issue is fixed in version 7.0.0.
  • CVE-2026-40251: Incus is a system container and virtual machine manager. In versions before 7.0.0, missing validation logic in the storage volume import logic allows an authenticated user with access to the storage volume feature to cause the Incus daemon to crash. The backup restore subsystem contains an out-of-bounds panic vulnerability caused by an invalid bounds check when indexing snapshot metadata arrays, and the same flawed pattern also appears in the migration path. When iterating through physical snapshots provided in a backup archive, the loop uses the index to look up corresponding metadata in the parsed `Config.Snapshots` and `Config.VolumeSnapshots` slices. The guard condition `len(slice) >= i-1` is incorrect because it can still evaluate to true when the subsequent slice[i] access is out of bounds. An attacker can submit a backup archive that contains physical snapshot directories while supplying a tampered `index.yaml` with an empty or truncated snapshot metadata array, causing the daemon to index beyond the end of the metadata slice and crash. Repeated use of this issue can be used to keep Incus offline, causing a denial of service. This issue is fixed in version 7.0.0.
  • CVE-2026-41647: Incus is a system container and virtual machine manager. Prior to version 7.0.0, a missing error handling could lead an authenticated Incus user to cause a daemon crash through the import of a truncated storage bucket backup file. This issue has been patched in version 7.0.0.
  • CVE-2026-41648: Incus is a system container and virtual machine manager. Prior to version 7.0.0, user provided image and backup tarballs would be unpacked and YAML files parsed without any size restrictions. This was making it easy for an authenticated user to provide a crafted image or backup tarball that when parsed by Incus would lead to a very large YAML document being loaded into memory, potentially causing the entire server to run out of memory. This issue has been patched in version 7.0.0.
  • CVE-2026-41684: Incus is a system container and virtual machine manager. Prior to version 7.0.0, backup.GetInfo() trusts the inline backup/index.yaml config when present and only falls back to parsing the legacy backup/container/backup.yaml file if result.Config == nil. As a result, an archive can carry a valid inline config that passes the initial import preflight while also carrying a malformed legacy backup/container/backup.yaml file that is reparsed later from the restored file system. ParseConfigYamlFile() accepts YAML documents with no container section, and multiple downstream consumers then dereference. Container without checking for nil. Confirmed examples in the instance restore and import flow include backup.UpdateInstanceConfig() and internalImportFromBackup(). An authenticated user with permission to import instance backups may be able to crash the Incus daemon with a crafted backup archive whose inline backup/index.yaml is valid but whose extracted legacy backup.yaml omits container. The crash occurs in the restore path after archive extraction has begun. This issue has been patched in version 7.0.0.
  • CVE-2026-41685: Incus is a system container and virtual machine manager. Prior to version 7.0.0, uploads of large amount of data by authenticated users can run the Incus server out of disk space, potentially taking down the host system. The impact here is limited for anyone using storage.images_volume and storage.backups_volume as those users will have large uploads be stored on those volumes rather than directly on the host filesystem. This is the default behavior on IncusOS. This issue has been patched in version 7.0.0.
Created: 2026-05-01 Last update: 2026-05-16 15:30
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 2-day delay is over. Check why.
Created: 2026-05-11 Last update: 2026-05-16 21:03
1 new commit since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit 1e64eddf7098222ee169a4d2305e1f920f31a18b
Author: Mathias Gibbens <gibmat@debian.org>
Date:   Tue May 12 23:34:45 2026 +0000

    Update minimum versions to assist with backporting
Created: 2026-05-13 Last update: 2026-05-13 01:33
Issues found with some translations low

Automatic checks made by the Debian l10n team found some issues with the translations contained in this package. You should check the l10n status report for more information.

Issues can be things such as missing translations, problematic translated strings, outdated PO files, unknown languages, etc.

Created: 2024-01-18 Last update: 2026-05-07 14:30
debian/patches: 3 patches to forward upstream low

Among the 7 debian patches available in version 7.0.0-1 of the package, we noticed the following issues:

  • 3 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2024-08-18 Last update: 2026-05-06 12:33
testing migrations
  • excuses:
    • Blocked by: golang-github-aws-smithy-go
    • Migrates after: golang-github-aws-aws-sdk-go-v2
    • Migration status for incus (6.0.6-3 to 7.0.0-1): Waiting for another item to be ready to migrate (no action required now - check later)
    • Issues preventing migration:
    • ∙ ∙ Built-Using: incus golang-github-aws-smithy-go (not considered)
    • ∙ ∙ Invalidated by built-using
    • ∙ ∙ Build-Depends(-Arch): incus golang-github-aws-aws-sdk-go-v2
    • ∙ ∙ Built-Using: incus golang-github-aws-aws-sdk-go-v2
    • ∙ ∙ Depends: incus golang-github-aws-aws-sdk-go-v2
    • Additional info (not blocking):
    • ∙ ∙ Updating incus will fix bugs in testing: #1135644
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/i/incus.html
    • ∙ ∙ Autopkgtest for incus/7.0.0-1: amd64: Pass, arm64: Pass, i386: Pass, loong64: Pass, ppc64el: Pass, riscv64: Pass, s390x: Pass
    • ∙ ∙ Reproduced on amd64 - info
    • ∙ ∙ Reproduced on arm64 - info
    • ∙ ∙ Reproduced on armhf - info
    • ∙ ∙ Reproduced on i386 - info
    • ∙ ∙ Required age reduced by 3 days because of autopkgtest
    • ∙ ∙ 11 days old (needed 2 days)
    • Not considered
news
[rss feed]
  • [2026-05-06] Accepted incus 7.0.0-1 (source) into unstable (Mathias Gibbens)
  • [2026-05-03] Accepted incus 6.0.4-2+deb13u7 (source) into proposed-updates (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2026-05-03] Accepted incus 6.0.4-2+deb13u7~bpo12+1 (source) into oldstable-backports (Mathias Gibbens)
  • [2026-05-02] Accepted incus 6.0.4-2+deb13u7 (source) into stable-security (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2026-04-18] Accepted incus 6.0.4-2+deb13u6 (source) into proposed-updates (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2026-04-17] incus 6.0.6-3 MIGRATED to testing (Debian testing watch)
  • [2026-04-16] Accepted incus 6.0.4-2+deb13u6~bpo12+1 (source) into oldstable-backports (Mathias Gibbens)
  • [2026-04-15] Accepted incus 6.0.4-2+deb13u6 (source) into stable-security (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2026-04-14] Accepted incus 6.0.6-3 (source) into unstable (Mathias Gibbens)
  • [2026-04-02] Accepted incus 6.0.4-2+deb13u5 (source) into proposed-updates (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2026-03-31] incus 6.0.6-2 MIGRATED to testing (Debian testing watch)
  • [2026-03-29] Accepted incus 6.0.4-2+deb13u5~bpo12+1 (source) into oldstable-backports (Mathias Gibbens)
  • [2026-03-29] Accepted incus 6.0.4-2+deb13u5 (source) into stable-security (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2026-03-27] Accepted incus 6.23.0-1~exp1 (source) into experimental (Mathias Gibbens)
  • [2026-03-26] Accepted incus 6.0.6-2 (source) into unstable (Mathias Gibbens)
  • [2026-03-25] incus 6.0.6-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-15] Accepted incus 6.0.6-1 (source) into unstable (Mathias Gibbens)
  • [2026-02-28] Accepted incus 6.22.0-1~exp1 (source) into experimental (Mathias Gibbens)
  • [2026-01-26] Accepted incus 6.0.4-2+deb13u4~bpo12+1 (source) into oldstable-backports (Mathias Gibbens)
  • [2026-01-25] incus 6.0.5-8 MIGRATED to testing (Debian testing watch)
  • [2026-01-24] Accepted incus 6.0.4-2+deb13u4 (source) into proposed-updates (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2026-01-23] Accepted incus 6.0.4-2+deb13u4 (source) into stable-security (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2026-01-23] Accepted incus 6.21.0-1~exp1 (source) into experimental (Mathias Gibbens)
  • [2026-01-23] Accepted incus 6.0.5-8 (source) into unstable (Mathias Gibbens)
  • [2026-01-10] Accepted incus 6.0.4-2+deb13u3~bpo12+1 (source) into oldstable-backports (Mathias Gibbens)
  • [2025-12-20] Accepted incus 6.20.0-1~exp1 (source) into experimental (Mathias Gibbens)
  • [2025-12-20] Accepted incus 6.0.4-2+deb13u3 (source) into proposed-updates (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2025-12-16] incus 6.0.5-7 MIGRATED to testing (Debian testing watch)
  • [2025-12-11] Accepted incus 6.0.5-7 (source) into unstable (Simon Josefsson)
  • [2025-11-25] incus 6.0.5-6 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 4
  • RC: 0
  • I&N: 3
  • M&W: 1
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • l10n (-, 34)
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 6.0.5-8
  • 2 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing