CVE-2016-1580

Publication date 29 April 2016

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

9.8 · Critical

Score breakdown

The setup_snappy_os_mounts function in the ubuntu-core-launcher package before 1.0.27.1 improperly determines the mount point of bind mounts when using snaps, which might allow remote attackers to obtain sensitive information or gain privileges via a snap with a name starting with "ubuntu-core."

Read the notes from the security team

Status

Package Ubuntu Release Status
ubuntu-core-launcher 16.04 LTS xenial
Fixed 1.0.27.1
15.10 wily
Not affected
14.04 LTS trusty Not in release
12.04 LTS precise Not in release

Notes


jdstrand

introduced in r83 only affects non-Ubuntu Core systems (ie, traditional Ubuntu systems running snappy)

Severity score breakdown

Parameter Value
Base score 9.8 · Critical
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-2956-1
    • ubuntu-core-launcher vulnerability
    • 29 April 2016

Other references