CVE-2026-3888

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
Configurations

No configuration.

History

18 Mar 2026, 04:17

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2026/03/18/1 -

18 Mar 2026, 00:16

Type Values Removed Values Added
References
  • () https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-3888-important-snap-flaw-enables-local-privilege-escalation-to-root -
  • () https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-systemd-tmpfiles.txt -
  • () https://discourse.ubuntu.com/t/snapd-local-privilege-escalation-cve-2026-3888 -
  • () https://ubuntu.com/security/notices/USN-8102-1 -

17 Mar 2026, 14:20

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-17 14:16

Updated : 2026-03-18 04:17


NVD link : CVE-2026-3888

Mitre link : CVE-2026-3888

CVE.ORG link : CVE-2026-3888


JSON object : View

Products Affected

No product.

CWE
CWE-268

Privilege Chaining