Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 20 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper access control vulnerability in the canonical-livepatch snap client prior to version 10.15.0 allows a local unprivileged user to obtain a sensitive, root-level authentication token by sending an unauthenticated request to the livepatchd.sock Unix domain socket. This vulnerability is exploitable on systems where an administrator has already enabled the Livepatch client with a valid Ubuntu Pro subscription. This token allows an attacker to access Livepatch services using the victim's credentials, as well as potentially cause issues to the Livepatch server. | |
| Title | Exposed Session Token in canonical-livepatch client snap | |
| Weaknesses | CWE-306 CWE-732 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-20T14:06:18.537Z
Reserved: 2026-04-15T15:52:27.875Z
Link: CVE-2026-6369
Updated: 2026-04-20T13:59:42.857Z
Status : Received
Published: 2026-04-20T14:16:22.380
Modified: 2026-04-20T14:16:22.380
Link: CVE-2026-6369
No data.
OpenCVE Enrichment
Updated: 2026-04-20T15:30:06Z