Bug 2452021 (CVE-2026-33711) - CVE-2026-33711 incus: Incus: Local privilege escalation or denial of service via predictable temporary file paths
Summary: CVE-2026-33711 incus: Incus: Local privilege escalation or denial of service ...
Keywords:
Status: NEW
Alias: CVE-2026-33711
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2452045 2452046
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-26 23:02 UTC by OSIDB Bzimport
Modified: 2026-03-26 23:23 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-03-26 23:02:05 UTC
Incus is a system container and virtual machine manager. Incus provides an API to retrieve VM screenshots. That API relies on the use of a temporary file for QEMU to write the screenshot to which is then picked up and sent to the user prior to deletion. As versions prior to 6.23.0 use predictable paths under /tmp for this, an attacker with local access to the system can abuse this mechanism by creating their own symlinks ahead of time. On the vast majority of Linux systems, this will result in a "Permission denied" error when requesting a screenshot. That's because the Linux kernel has a security feature designed to block such attacks, `protected_symlinks`. On the rare systems with this purposefully disabled, it's then possible to trick Incus intro truncating and altering the mode and permissions of arbitrary files on the filesystem, leading to a potential denial of service or possible local privilege escalation. Version 6.23.0 fixes the issue.


Note You need to log in before you can comment on or make changes to this bug.