CVE-2024-6219: lxd has a restricted TLS certificate privilege escalation when in PKI mode
(updated )
If a server.ca file is present in LXD_DIR at LXD start up, LXD is in “PKI mode”. In this mode, all clients must have certificates that have been signed by the CA.
The LXD configuration option core.trust_ca_certificates defaults to false. This means that although the client certificate has been signed by the CA, LXD will additionally add the certificate to the trust store and verify it via mTLS.
When a restricted certificate is added to the trust store in this mode, it’s restrictions are not honoured, and the client has full access to LXD.
References
Code Behaviors & Features
Detect and mitigate CVE-2024-6219 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →