Description
Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
Problem types
Product status
Any version before 2.75.1
2.61.4ubuntu0.16.04.1+esm2 (dpkg) before *
2.61.4ubuntu0.18.04.1+esm2 (dpkg) before *
2.67.1+20.04ubuntu1~esm1 (dpkg) before *
2.73+ubuntu22.04.1 (dpkg) before *
2.73+ubuntu24.04.2 (dpkg) before *
Credits
Qualys Security Advisory Team
References
www.openwall.com/lists/oss-security/2026/03/18/1
ubuntu.com/security/CVE-2026-3888
ubuntu.com/security/notices/USN-8102-1
discourse.ubuntu.com/...l-privilege-escalation-cve-2026-3888
blog.qualys.com/...nables-local-privilege-escalation-to-root
cdn2.qualys.com/...6/03/17/snap-confine-systemd-tmpfiles.txt