First published: Fri May 13 2016(Updated: )
The setup_snappy_os_mounts function in the ubuntu-core-launcher package before 1.0.27.1 improperly determines the mount point of bind mounts when using snaps, which might allow remote attackers to obtain sensitive information or gain privileges via a snap with a name starting with "ubuntu-core."
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =16.04 | |
canonical ubuntu-core-launcher | =1.0.27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1580 has a high severity rating due to its potential to allow remote attackers to gain access to sensitive information or escalate privileges.
To fix CVE-2016-1580, update the ubuntu-core-launcher package to version 1.0.27.1 or later.
CVE-2016-1580 specifically affects the ubuntu-core-launcher package version 1.0.27 and earlier on Ubuntu 16.04 LTS.
CVE-2016-1580 can facilitate attacks that allow remote attackers to access sensitive information or elevate privileges through malicious snaps.
There is no official workaround for CVE-2016-1580; upgrading to the patched version is the recommended solution.