github.com/canonical/lxd

govv0.0.0-20260429074013-a2cf2557db3d

Powerful system container and virtual machine manager

License AGPL-3.0network copyleft0 versions462 maintainers0 deps4,732 weekly dl
canonical/lxd
45
/ 100
Health
do not use

github.com/canonical/lxd has critical vulnerabilities — do not use

Update to >= 0.0.0-20250827065555-0494f5d47e41 to fix known vulnerabilities

  • 4 high severity vulnerabilities
  • 3 critical vulnerabilities
Health breakdown0 – 100
25/25
maintenance
6/20
popularity
0/25
security
9/15
maturity
5/15
community
Vulnerabilities
24
3 critical4 high4 medium13 low
Advisories (24)
SeverityIDSummaryFixed in
highGO-2025-4121LXD vulnerable to a local privilege escalation through custom storage volumes0.0.0-20251110144034-698854d0164f
highCVE-2025-54289Canonical LXD Vulnerable to Privilege Escalation via WebSocket Connection Hijacking in Operations API0.0.0-20250827065555-0494f5d47e41
highCVE-2025-54293Canonical LXD Path Traversal Vulnerability in Instance Log File Retrieval Function0.0.0-20250224180022-ec09b24179f3
lowCVE-2024-6156lxd CA certificate sign check bypass0.0.0-20240708073652-5a492a3f0036
mediumCVE-2025-54288Canonical LXD Source Container Identification Vulnerability via cmdline Spoofing in devLXD Server0.0.0-20250827065555-0494f5d47e41
criticalCVE-2026-34179LXD: Update of type field in restricted TLS certificate allows privilege escalation to cluster admin
mediumCVE-2026-3351lxd's non-recursive certificate listing bypasses per-object authorization and leaks all fingerprints0.0.0-20260224152359-d936c90d47cf
criticalCVE-2026-34177LXD: VM lowlevel restriction bypass via raw.apparmor and raw.qemu.conf
lowCVE-2024-6219lxd has a restricted TLS certificate privilege escalation when in PKI mode0.0.0-20240403103450-0e7f2b5bf4d2
mediumCVE-2025-54290Canonical LXD Project Existence Determination Through Error Handling in Image Export Function0.0.0-20250827065555-0494f5d47e41
highCVE-2025-54286Canonical LXD CSRF Vulnerability When Using Client Certificate Authentication with the LXD-UI0.0.0-20250827065555-0494f5d47e41
criticalCVE-2026-34178LXD: Importing a crafted backup leads to project restriction bypass
lowGHSA-x9qq-236j-gj97Canonical LXD documentation improvement to make clear restricted.devices.disk=allow without restricted.devices.disk.paths also allows shift=true0.0.0-20240118092008-ce1bd0dd37bb
mediumCVE-2025-54291Canonical LXD Project Existence Determination Through Error Handling in Image Get Function0.0.0-20250827065555-0494f5d47e41
unknownCVE-2024-6156CA certificate sign check bypass in github.com/canonical/lxd0.0.0-20240708073652-5a492a3f0036
unknownCVE-2024-6219Restricted TLS certificate privilege escalation when in PKI mode in github.com/canonical/lxd0.0.0-20240403103450-0e7f2b5bf4d2
unknownCVE-2025-54289Privilege Escalation via WebSocket Connection Hijacking in Operations API in github.com/canonical/lxd
unknownCVE-2025-54293Canonical LXD Path Traversal Vulnerability in Instance Log File Retrieval Function in github.com/canonical/lxd0.0.0-20250224180022-ec09b24179f3
unknownCVE-2025-54288Canonical LXD Source Container Identification Vulnerability via cmdline Spoofing in devLXD Server in github.com/canonical/lxd0.0.0-20250827065555-0494f5d47e41
unknownCVE-2025-54290Canonical LXD Project Existence Determination Through Error Handling in Image Export Function in github.com/canonical/lxd0.0.0-20250827065555-0494f5d47e41
... and 4 more

Health History

Dependency Tree

License Audit

API access

Get this data programmatically — free, no authentication.

curl https://depscope.dev/api/check/go/github.com/canonical/lxd

Last updated · 2026-04-29T07:40:13Z