Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/canonical/lxd
  4. ›
  5. CVE-2024-6156

CVE-2024-6156: lxd CA certificate sign check bypass

December 9, 2024 (updated December 11, 2024)

If a server.ca file is present in LXD_DIR at LXD start up, LXD is in “PKI mode”. In this mode, only TLS clients that have a CA-signed certificate should be able to authenticate with LXD.

We have discovered that if a client that sends a non-CA signed certificate during the TLS handshake, that client is able to authenticate with LXD if their certificate is present in the trust store.

  • The LXD Go client (and by extension lxc) does not send non-CA signed certificates during the handshake.
  • A manual client (e.g. cURL) might send a non-CA signed certificate during the handshake.

References

  • github.com/advisories/GHSA-4c49-9fpc-hc3v
  • github.com/canonical/lxd
  • github.com/canonical/lxd/commit/92468bb60f4f1edf38ff0434414bea4f28afa711
  • github.com/canonical/lxd/security/advisories/GHSA-4c49-9fpc-hc3v
  • nvd.nist.gov/vuln/detail/CVE-2024-6156
  • pkg.go.dev/vuln/GO-2024-3312
  • www.cve.org/CVERecord?id=CVE-2024-6156

Code Behaviors & Features

Detect and mitigate CVE-2024-6156 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.0.0-20240708073652-5a492a3f0036

Fixed versions

  • 0.0.0-20240708073652-5a492a3f0036

Solution

Upgrade to version 0.0.0-20240708073652-5a492a3f0036 or above.

Impact 3.8 LOW

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-295: Improper Certificate Validation

Source file

go/github.com/canonical/lxd/CVE-2024-6156.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:56 +0000.