CVE-2026-34177
Canonical · LXD
An incomplete denylist in Canonical LXD allows a restricted project user to inject AppArmor and QEMU configurations, facilitating privilege escalation to host root.
Executive summary
A critical vulnerability in Canonical LXD allows an attacker with restricted VM permissions to escape the sandbox and achieve full host root privileges.
Vulnerability
The vulnerability resides in the isVMLowLevelOptionForbidden function, which fails to correctly block raw.apparmor and raw.qemu.conf keys. An authenticated attacker with can_edit permissions can leverage this to bridge the LXD Unix socket and escalate privileges.
Business impact
With a CVSS score of 9.1, this flaw represents a major security failure in multi-tenant environments. An attacker gaining host root access effectively compromises the entire hypervisor and all containers or VMs managed by the cluster, leading to total data loss and system-wide compromise.
Remediation
Immediate Action: Upgrade Canonical LXD to the latest version to ensure the restricted project denylist is properly enforced.
Proactive Monitoring: Audit LXD project configurations for unauthorized usage of raw.apparmor or raw.qemu.conf keys.
Compensating Controls: Restrict the can_edit permission to only highly trusted administrators until the patch can be applied.
Exploitation status
Public Exploit Available: Unknown
Analyst recommendation
This vulnerability poses a severe risk to containerized and virtualized environments. Administrators must audit their current LXD configurations for signs of tampering and apply the vendor-provided patch immediately to prevent unauthorized host-level access.