Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
References
Configurations
No configuration.
History
18 Mar 2026, 04:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
18 Mar 2026, 00:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
17 Mar 2026, 14:20
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-17 14:16
Updated : 2026-03-18 04:17
NVD link : CVE-2026-3888
Mitre link : CVE-2026-3888
CVE.ORG link : CVE-2026-3888
JSON object : View
Products Affected
No product.
CWE
CWE-268
Privilege Chaining
