CVE-2016-1580

The setup_snappy_os_mounts function in the ubuntu-core-launcher package before 1.0.27.1 improperly determines the mount point of bind mounts when using snaps, which might allow remote attackers to obtain sensitive information or gain privileges via a snap with a name starting with "ubuntu-core."
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:a:canonical:ubuntu-core-launcher:1.0.27:*:*:*:*:*:*:*

History

21 Nov 2024, 02:46

Type Values Removed Values Added
References () http://www.ubuntu.com/usn/USN-2956-1 - Vendor Advisory () http://www.ubuntu.com/usn/USN-2956-1 - Vendor Advisory
References () https://bugs.launchpad.net/ubuntu/+source/ubuntu-core-launcher/+bug/1576699 - () https://bugs.launchpad.net/ubuntu/+source/ubuntu-core-launcher/+bug/1576699 -

Information

Published : 2016-05-13 14:59

Updated : 2024-11-21 02:46


NVD link : CVE-2016-1580

Mitre link : CVE-2016-1580

CVE.ORG link : CVE-2016-1580


JSON object : View

Products Affected

canonical

  • ubuntu_linux
  • ubuntu-core-launcher
CWE
CWE-264

Permissions, Privileges, and Access Controls