CVE-2026-33711: Incus vulnerable to local privilege escalation through VM screenshot path
Incus provides an API to retrieve VM screenshots, that API relies on the use of a temporary file for QEMU to write the screenshot to which is then picked up and sent to the user prior to deletion.
As Incus uses predictable paths under /tmp for this, an attacker with local access to the system can abuse this mechanism by creating their own symlinks ahead of time.
On the vast majority of Linux systems, this will result in a “Permission denied” error when requesting a screenshot. That’s because the Linux kernel has a security feature designed to block such attacks, protected_symlinks.
On the rare systems with this purposefully disabled, it’s then possible to trick Incus intro truncating and altering the mode and permissions of arbitrary files on the filesystem, leading to a potential denial of service or possible local privilege escalation.
References
Code Behaviors & Features
Detect and mitigate CVE-2026-33711 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →