Description
An improper access control vulnerability in the canonical-livepatch snap client prior to version 10.15.0 allows a local unprivileged user to obtain a sensitive, root-level authentication token by sending an unauthenticated request to the livepatchd.sock Unix domain socket. This vulnerability is exploitable on systems where an administrator has already enabled the Livepatch client with a valid Ubuntu Pro subscription. This token allows an attacker to access Livepatch services using the victim's credentials, as well as potentially cause issues to the Livepatch server.
INFO
Published Date :
2026-04-20T13:38:13.691Z
Last Modified :
2026-04-20T14:06:18.537Z
Source :
canonical
AFFECTED PRODUCTS
The following products are affected by CVE-2026-6369 vulnerability.
| Vendors | Products |
|---|---|
| Canonical |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-6369.