Skip to content

chore(deps): update dependency lxc/incus to v6.19.0#16890

Merged
github-actions[bot] merged 1 commit intomainfrom
renovate/lxc-incus-6.x
Nov 29, 2025
Merged

chore(deps): update dependency lxc/incus to v6.19.0#16890
github-actions[bot] merged 1 commit intomainfrom
renovate/lxc-incus-6.x

Conversation

@uniget-bot
Copy link
Copy Markdown

This PR contains the following updates:

Package Update Change
lxc/incus minor 6.18.0 -> 6.19.0

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

lxc/incus (lxc/incus)

v6.19.0: Incus 6.19

Compare Source

What's Changed

New Contributors

Full Changelog: lxc/incus@v6.18.0...v6.19.0


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

Copy link
Copy Markdown

@nicholasdille-bot nicholasdille-bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Auto-approved because label type/renovate is present.

@github-actions
Copy link
Copy Markdown

🔍 Vulnerabilities of ghcr.io/uniget-org/tools/incus:6.19.0

📦 Image Reference ghcr.io/uniget-org/tools/incus:6.19.0
digestsha256:e9173764910c949756280c30372209d00f68f8bdc64f446c6a93631057a789c8
vulnerabilitiescritical: 0 high: 1 medium: 0 low: 0
platformlinux/amd64
size16 MB
packages70
critical: 0 high: 1 medium: 0 low: 0 github.com/lxc/incus/v6 6.0.0-20251129060529-b19f4195c0f5 (golang)

pkg:golang/github.com/lxc/incus/v6@6.0.0-20251129060529-b19f4195c0f5

high 8.6: CVE--2025--64507 Improper Privilege Management

Affected range<=6.0.6
Fixed versionNot Fixed
CVSS Score8.6
CVSS VectorCVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Description

Impact

This affects any Incus user in an environment where an unprivileged user may have root access to a container with an attached custom storage volume that has the security.shifted property set to true as well as access to the host as an unprivileged user.

The most common case for this would be systems using incus-user with the less privileged incus group to provide unprivileged users with an isolated restricted access to Incus. Such users may be able to create a custom storage volume with the necessary property (depending on kernel and filesystem support) and can then write a setuid binary from within the container which can be executed as an unpriivleged user on the host to gain root privileges.

Patches

A patch for this issue is available here: lxc/incus#2642

The first commit changes the permissions for any new storage pool, the second commit applies it on startup to all existing storage pools.

Workarounds

Permissions can be manually restricted until a patched version of Incus is deployed.

This is done with:

chmod 0700 /var/lib/incus/storage-pools/*/*
chmod 0711 /var/lib/incus/storage-pools/*/buckets*
chmod 0711 /var/lib/incus/storage-pools/*/container*

Those are the same permissions which will be applied by the patched Incus for both new and existing storage pools.

References

This was reported publicly on Github: lxc/incus#2641

@github-actions
Copy link
Copy Markdown

@github-actions
Copy link
Copy Markdown

@github-actions github-actions bot merged commit a9f2db7 into main Nov 29, 2025
9 of 10 checks passed
@github-actions github-actions bot deleted the renovate/lxc-incus-6.x branch November 29, 2025 08:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants