Home

Description

An improper access control vulnerability in the canonical-livepatch snap client prior to version 10.15.0 allows a local unprivileged user to obtain a sensitive, root-level authentication token by sending an unauthenticated request to the livepatchd.sock Unix domain socket. This vulnerability is exploitable on systems where an administrator has already enabled the Livepatch client with a valid Ubuntu Pro subscription. This token allows an attacker to access Livepatch services using the victim's credentials, as well as potentially cause issues to the Livepatch server.

PUBLISHED Reserved 2026-04-15 | Published 2026-04-20 | Updated 2026-04-20 | Assigner canonical




MEDIUM: 5.7CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:L/SA:L

Problem types

CWE-306 Missing authentication for critical function

CWE-732 Incorrect Permission Assignment for Critical Resource

Product status

Default status
unaffected

Any version before 10.15.0
affected

References

discourse.ubuntu.com/...atch-client-snap-vulnerability/80662 vendor-advisory

cve.org (CVE-2026-6369)

nvd.nist.gov (CVE-2026-6369)

Download JSON