| Summary | An improper access control vulnerability in the canonical-livepatch snap client prior to version 10.15.0 allows a local unprivileged user to obtain a sensitive, root-level authentication token by sending an unauthenticated request to the livepatchd.sock Unix domain socket. This vulnerability is exploitable on systems where an administrator has already enabled the Livepatch client with a valid Ubuntu Pro subscription. This token allows an attacker to access Livepatch services using the victim's credentials, as well as potentially cause issues to the Livepatch server. |
|---|---|
| Publication Date | April 20, 2026, 11:16 p.m. |
| Registration Date | April 21, 2026, 4:09 a.m. |
| Last Update | April 20, 2026, 11:16 p.m. |