CVE-2025-54288: Canonical LXD Source Container Identification Vulnerability via cmdline Spoofing in devLXD Server
In LXD’s devLXD server, the source container identification process uses process cmdline (command line) information, allowing attackers to impersonate other containers by spoofing process names.
The core issue lies in the findContainerForPID function in lxd/api_devlxd.go
.
This function identifies senders through two steps as shown below:
- cmdline-based identification: Check while tracing back through parent processes, and if it starts with
[lxc monitor]
, extract the project name and container name from that process name in the format projectName_containerName. - PID namespace-based identification: If not found in Step 1, check against all containers’ PID namespaces.
Attackers can exploit Step 1 processing to impersonate arbitrary containers across projects by spoofing process names.
References
Code Behaviors & Features
Detect and mitigate CVE-2025-54288 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →