CVE Vulnerabilities

CVE-2026-3888

Privilege Chaining

Published: Mar 17, 2026 | Modified: Mar 18, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
HIGH
root.io logo minimus.io logo echo.ai logo

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snaps private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

Weakness

Two distinct privileges, roles, capabilities, or rights can be combined in a way that allows an entity to perform unsafe actions that would not be allowed without that combination.

Affected Software

NameVendorStart VersionEnd Version
SnapdUbuntudevel*
SnapdUbuntuesm-infra/bionic*
SnapdUbuntuesm-infra/focal*
SnapdUbuntuesm-infra/xenial*
SnapdUbuntujammy*
SnapdUbuntunoble*
SnapdUbuntuquesting*
SnapdUbuntusnap*
SnapdUbuntuupstream*

Potential Mitigations

References