Debian Package Tracker
Register | Log in
Subscribe

lxd

Choose email to subscribe with

general
  • source: lxd (main)
  • version: 5.0.2+git20231211.1364ae4-9+deb13u2
  • maintainer: Debian Go Packaging Team (DMD)
  • uploaders: Mathias Gibbens [DMD]
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 5.0.2-5+deb12u2
  • old-sec: 5.0.2-5+deb12u2
  • stable: 5.0.2+git20231211.1364ae4-9+deb13u2
  • stable-sec: 5.0.2+git20231211.1364ae4-9+deb13u1
versioned links
  • 5.0.2-5+deb12u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.0.2+git20231211.1364ae4-9+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5.0.2+git20231211.1364ae4-9+deb13u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • golang-github-canonical-lxd-dev
  • lxd
  • lxd-agent
  • lxd-client
  • lxd-migrate
  • lxd-tools
package is gone
This package is not in any development repository. This probably means that the package has been removed (or has been renamed). Thus the information here is of little interest ... the package is going to disappear unless someone takes it over and reintroduces it.
action needed
Debci reports failed tests high
  • unstable: fail (log)
    The tests ran in 0:00:22
    Last run: 2025-08-27T01:32:05.000Z
    Previous status: unknown

  • testing: pass (log)
    The tests ran in 0:03:03
    Last run: 2025-08-01T01:31:38.000Z
    Previous status: unknown

  • stable: pass (log)
    The tests ran in 0:03:22
    Last run: 2025-11-10T02:02:24.000Z
    Previous status: unknown

Created: 2025-08-27 Last update: 2026-02-04 13:03
6 security issues in trixie high

There are 6 open security issues in trixie.

2 important issues:
  • CVE-2026-23953: Incus is a system container and virtual machine manager. In versions 6.20.0 and below, a user with the ability to launch a container with a custom YAML configuration (e.g a member of the ‘incus’ group) can create an environment variable containing newlines, which can be used to add additional configuration items in the container’s lxc.conf due to newline injection. This can allow adding arbitrary lifecycle hooks, ultimately resulting in arbitrary command execution on the host. Exploiting this issue on IncusOS requires a slight modification of the payload to change to a different writable directory for the validation step (e.g /tmp). This can be confirmed with a second container with /tmp mounted from the host (A privileged action for validation only). A fix is planned for versions 6.0.6 and 6.21.0, but they have not been released at the time of publication.
  • CVE-2026-23954: Incus is a system container and virtual machine manager. Versions 6.21.0 and below allow a user with the ability to launch a container with a custom image (e.g a member of the ‘incus’ group) to use directory traversal or symbolic links in the templating functionality to achieve host arbitrary file read, and host arbitrary file write. This ultimately results in arbitrary command execution on the host. When using an image with a metadata.yaml containing templates, both the source and target paths are not checked for symbolic links or directory traversal. This can also be exploited in IncusOS. A fix is planned for versions 6.0.6 and 6.21.0, but they have not been released at the time of publication.
4 ignored issues:
  • CVE-2024-6156: Mark Laing discovered that LXD's PKI mode, until version 5.21.2, could be bypassed if the client's certificate was present in the trust store.
  • CVE-2025-54289: Privilege Escalation in operations API in Canonical LXD <6.5 on multiple platforms allows attacker with read permissions to hijack terminal or console sessions and execute arbitrary commands via WebSocket connection hijacking format
  • CVE-2025-54290: Information disclosure in image export API in Canonical LXD before 6.5 and 5.21.4 on Linux allows network attackers to determine project existence without authentication via crafted requests using wildcard fingerprints.
  • CVE-2025-54291: Information disclosure in images API in Canonical LXD before 6.5 and 5.21.4 on all platforms allows unauthenticated remote attackers to determine project existence via differing HTTP status code responses.
Created: 2025-08-09 Last update: 2026-01-23 07:02
6 security issues in bookworm high

There are 6 open security issues in bookworm.

2 important issues:
  • CVE-2026-23953: Incus is a system container and virtual machine manager. In versions 6.20.0 and below, a user with the ability to launch a container with a custom YAML configuration (e.g a member of the ‘incus’ group) can create an environment variable containing newlines, which can be used to add additional configuration items in the container’s lxc.conf due to newline injection. This can allow adding arbitrary lifecycle hooks, ultimately resulting in arbitrary command execution on the host. Exploiting this issue on IncusOS requires a slight modification of the payload to change to a different writable directory for the validation step (e.g /tmp). This can be confirmed with a second container with /tmp mounted from the host (A privileged action for validation only). A fix is planned for versions 6.0.6 and 6.21.0, but they have not been released at the time of publication.
  • CVE-2026-23954: Incus is a system container and virtual machine manager. Versions 6.21.0 and below allow a user with the ability to launch a container with a custom image (e.g a member of the ‘incus’ group) to use directory traversal or symbolic links in the templating functionality to achieve host arbitrary file read, and host arbitrary file write. This ultimately results in arbitrary command execution on the host. When using an image with a metadata.yaml containing templates, both the source and target paths are not checked for symbolic links or directory traversal. This can also be exploited in IncusOS. A fix is planned for versions 6.0.6 and 6.21.0, but they have not been released at the time of publication.
4 ignored issues:
  • CVE-2024-6156: Mark Laing discovered that LXD's PKI mode, until version 5.21.2, could be bypassed if the client's certificate was present in the trust store.
  • CVE-2025-54289: Privilege Escalation in operations API in Canonical LXD <6.5 on multiple platforms allows attacker with read permissions to hijack terminal or console sessions and execute arbitrary commands via WebSocket connection hijacking format
  • CVE-2025-54290: Information disclosure in image export API in Canonical LXD before 6.5 and 5.21.4 on Linux allows network attackers to determine project existence without authentication via crafted requests using wildcard fingerprints.
  • CVE-2025-54291: Information disclosure in images API in Canonical LXD before 6.5 and 5.21.4 on all platforms allows unauthenticated remote attackers to determine project existence via differing HTTP status code responses.
Created: 2024-12-06 Last update: 2026-01-23 07:02
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2024-6156: Mark Laing discovered that LXD's PKI mode, until version 5.21.2, could be bypassed if the client's certificate was present in the trust store.
Created: 2025-08-09 Last update: 2025-08-13 17:04
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2024-6156: Mark Laing discovered that LXD's PKI mode, until version 5.21.2, could be bypassed if the client's certificate was present in the trust store.
Created: 2024-12-06 Last update: 2025-08-10 06:32
news
[rss feed]
  • [2025-12-07] Accepted lxd 5.0.2+git20231211.1364ae4-9+deb13u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2025-11-14] Accepted lxd 5.0.2-5+deb12u2 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2025-11-13] Accepted lxd 5.0.2-5+deb12u2 (source) into oldstable-security (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2025-10-19] Accepted lxd 5.0.2-5+deb12u1 (source amd64) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2025-10-19] Accepted lxd 5.0.2+git20231211.1364ae4-9+deb13u1 (source all amd64) into proposed-updates (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2025-10-17] Accepted lxd 5.0.2-5+deb12u1 (source amd64) into oldstable-security (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2025-10-17] Accepted lxd 5.0.2+git20231211.1364ae4-9+deb13u1 (source all amd64) into stable-security (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2025-08-14] lxd REMOVED from testing (Debian testing watch)
  • [2025-05-08] lxd 5.0.2+git20231211.1364ae4-9 MIGRATED to testing (Debian testing watch)
  • [2025-04-27] Accepted lxd 5.0.2+git20231211.1364ae4-9 (source) into unstable (Mathias Gibbens)
  • [2025-03-01] lxd 5.0.2+git20231211.1364ae4-8 MIGRATED to testing (Debian testing watch)
  • [2025-02-23] Accepted lxd 5.0.2+git20231211.1364ae4-8 (source) into unstable (Mathias Gibbens)
  • [2024-08-20] lxd 5.0.2+git20231211.1364ae4-7 MIGRATED to testing (Debian testing watch)
  • [2024-08-17] Accepted lxd 5.0.2+git20231211.1364ae4-7 (source) into unstable (Reinhard Tartler)
  • [2024-08-09] Accepted lxd 5.0.2+git20231211.1364ae4-6 (source) into experimental (Reinhard Tartler)
  • [2024-06-15] lxd 5.0.2+git20231211.1364ae4-5 MIGRATED to testing (Debian testing watch)
  • [2024-06-12] Accepted lxd 5.0.2+git20231211.1364ae4-5 (source) into unstable (Mathias Gibbens)
  • [2024-05-01] lxd 5.0.2+git20231211.1364ae4-4 MIGRATED to testing (Debian testing watch)
  • [2024-04-11] Accepted lxd 5.0.2+git20231211.1364ae4-4 (source) into unstable (Mathias Gibbens)
  • [2024-01-24] lxd 5.0.2+git20231211.1364ae4-3 MIGRATED to testing (Debian testing watch)
  • [2024-01-21] Accepted lxd 5.0.2+git20231211.1364ae4-3 (source) into unstable (Mathias Gibbens)
  • [2024-01-17] lxd 5.0.2+git20231211.1364ae4-2 MIGRATED to testing (Debian testing watch)
  • [2024-01-09] Accepted lxd 5.0.2+git20231211.1364ae4-2 (source) into unstable (Mathias Gibbens)
  • [2024-01-08] Accepted lxd 5.0.2+git20231211.1364ae4-1 (source all amd64) into unstable (Debian FTP Masters) (signed by: Mathias Gibbens)
  • [2023-11-26] lxd 5.0.2-6 MIGRATED to testing (Debian testing watch)
  • [2023-11-23] Accepted lxd 5.0.2-6 (source) into unstable (Mathias Gibbens)
  • [2023-05-12] lxd 5.0.2-5 MIGRATED to testing (Debian testing watch)
  • [2023-05-05] Accepted lxd 5.0.2-5 (source) into unstable (Mathias Gibbens)
  • [2023-04-23] Accepted lxd 5.0.2-4 (source) into unstable (Mathias Gibbens)
  • [2023-03-28] lxd 5.0.2-3 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • buildd: logs, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debci

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing