Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical canonical-livepatch |
|
| Vendors & Products |
Canonical
Canonical canonical-livepatch |
Mon, 20 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper access control vulnerability in the canonical-livepatch snap client prior to version 10.15.0 allows a local unprivileged user to obtain a sensitive, root-level authentication token by sending an unauthenticated request to the livepatchd.sock Unix domain socket. This vulnerability is exploitable on systems where an administrator has already enabled the Livepatch client with a valid Ubuntu Pro subscription. This token allows an attacker to access Livepatch services using the victim's credentials, as well as potentially cause issues to the Livepatch server. | |
| Title | Exposed Session Token in canonical-livepatch client snap | |
| Weaknesses | CWE-306 CWE-732 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-04-20T14:06:18.537Z
Reserved: 2026-04-15T15:52:27.875Z
Link: CVE-2026-6369
Updated: 2026-04-20T13:59:42.857Z
Status : Awaiting Analysis
Published: 2026-04-20T14:16:22.380
Modified: 2026-04-20T19:05:30.750
Link: CVE-2026-6369
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:48:01Z