Home

Description

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

PUBLISHED Reserved 2026-03-10 | Published 2026-03-17 | Updated 2026-03-18 | Assigner canonical




HIGH: 7.8CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-268 Privilege chaining

Product status

Default status
unaffected

Any version before 2.75.1
affected

Default status
affected

2.61.4ubuntu0.16.04.1+esm2 (dpkg) before *
unaffected

Default status
affected

2.61.4ubuntu0.18.04.1+esm2 (dpkg) before *
unaffected

Default status
affected

2.67.1+20.04ubuntu1~esm1 (dpkg) before *
unaffected

Default status
affected

2.73+ubuntu22.04.1 (dpkg) before *
unaffected

Default status
affected

2.73+ubuntu24.04.2 (dpkg) before *
unaffected

Credits

Qualys Security Advisory Team finder

References

www.openwall.com/lists/oss-security/2026/03/18/1

ubuntu.com/security/CVE-2026-3888 vdb-entry issue-tracking

ubuntu.com/security/notices/USN-8102-1 vendor-advisory

discourse.ubuntu.com/...l-privilege-escalation-cve-2026-3888 technical-description vendor-advisory

blog.qualys.com/...nables-local-privilege-escalation-to-root technical-description media-coverage

cdn2.qualys.com/...6/03/17/snap-confine-systemd-tmpfiles.txt technical-description media-coverage

cve.org (CVE-2026-3888)

nvd.nist.gov (CVE-2026-3888)

Download JSON