In Canonical LXD before 6.8, the backup import path validates project restrictions against backup/index.yaml in the supplied tar archive but creates the instance from backup/container/backup.yaml, a separate file in the same archive that is never checked against project restrictions. An authenticated remote attacker with instance-creation permission in a restricted project can craft a backup archive where backup.yaml carries restricted settings such as security.privileged=true or raw.lxc directives, bypassing all project restriction enforcement and allowing full host compromise.
| Vendor | Product | Versions |
|---|---|---|
| canonical | lxd | 4.12.0, 5.1.0, 6.0.0 |
Updated affected versions to include 5.0.6, 5.21.4, and 6.7.x, and noted that there is no exploit available.
Initial creation