Improper Privilege Management Affecting lxd package, versions <5.0.2-5+deb12u2


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.02% (4th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Privilege Management vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN12-LXD-13875903
  • published11 Nov 2025
  • disclosed10 Nov 2025

Introduced: 10 Nov 2025

NewCVE-2025-64507  (opens in a new tab)
CWE-269  (opens in a new tab)

How to fix?

Upgrade Debian:12 lxd to version 5.0.2-5+deb12u2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream lxd package and not the lxd package as distributed by Debian. See How to fix? for Debian:12 relevant fixed versions and status.

Incus is a system container and virtual machine manager. An issue in versions prior to 6.0.6 and 6.19.0 affects any Incus user in an environment where an unprivileged user may have root access to a container with an attached custom storage volume that has the security.shifted property set to true as well as access to the host as an unprivileged user. The most common case for this would be systems using incus-user with the less privileged incus group to provide unprivileged users with an isolated restricted access to Incus. Such users may be able to create a custom storage volume with the necessary property (depending on kernel and filesystem support) and can then write a setuid binary from within the container which can be executed as an unprivileged user on the host to gain root privileges. A patch for this issue is expected in versions 6.0.6 and 6.19.0. As a workaround, permissions can be manually restricted until a patched version of Incus is deployed.