Untriaged
Permalink
CVE-2026-3888
7.8 HIGH
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): CHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Local Privilege Escalation in snapd
Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
References
-
-
https://ubuntu.com/security/notices/USN-8102-1 vendor-advisory
-
https://discourse.ubuntu.com/t/snapd-local-privilege-escalation-cve-2026-3888 vendor-advisorytechnical-description
-
https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-388… media-coveragetechnical-description
-
https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-systemd-tmpfiles.txt media-coveragetechnical-description
Affected products
snapd
- <2.75.1
- *