| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6244-1 | incus security update |
Debian DSA |
DSA-6247-1 | lxd security update |
Github GHSA |
GHSA-67wx-r9xr-x75x | Incus has Unbounded YAML Metadata Decode via Parsing |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 07 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 07 May 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lxc
Lxc incus |
|
| Vendors & Products |
Lxc
Lxc incus |
Thu, 07 May 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Incus is a system container and virtual machine manager. Prior to version 7.0.0, user provided image and backup tarballs would be unpacked and YAML files parsed without any size restrictions. This was making it easy for an authenticated user to provide a crafted image or backup tarball that when parsed by Incus would lead to a very large YAML document being loaded into memory, potentially causing the entire server to run out of memory. This issue has been patched in version 7.0.0. | |
| Title | Incus: Unbounded YAML Metadata Decode via Parsing | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-07T15:11:42.272Z
Reserved: 2026-04-21T23:58:43.802Z
Link: CVE-2026-41648
Updated: 2026-05-07T15:09:54.698Z
Status : Undergoing Analysis
Published: 2026-05-07T14:16:03.200
Modified: 2026-05-07T16:16:19.930
Link: CVE-2026-41648
No data.
OpenCVE Enrichment
Updated: 2026-05-07T15:00:13Z
Debian DSA
Github GHSA