CRITICAL · 9.8

CVE-2016-1580

The setup_snappy_os_mounts function in the ubuntu-core-launcher package before 1.0.27.1 improperly determines the mount point of bind mounts when using snaps, which might allow remote attackers to obt...

Vulnerability Description

The setup_snappy_os_mounts function in the ubuntu-core-launcher package before 1.0.27.1 improperly determines the mount point of bind mounts when using snaps, which might allow remote attackers to obtain sensitive information or gain privileges via a snap with a name starting with "ubuntu-core."

CVSS Score

9.8

CRITICAL

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
CanonicalUbuntu Linux16.04
CanonicalUbuntu-Core-Launcher1.0.27

Related Weaknesses (CWE)

References

FAQ

What is CVE-2016-1580?

CVE-2016-1580 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The setup_snappy_os_mounts function in the ubuntu-core-launcher package before 1.0.27.1 improperly determines the mount point of bind mounts when using snaps, which might allow remote attackers to obt...

How severe is CVE-2016-1580?

CVE-2016-1580 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2016-1580?

Check the references section above for vendor advisories and patch information. Affected products include: Canonical Ubuntu Linux, Canonical Ubuntu-Core-Launcher.