Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snaps private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
Two distinct privileges, roles, capabilities, or rights can be combined in a way that allows an entity to perform unsafe actions that would not be allowed without that combination.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Snapd | Ubuntu | devel | * |
| Snapd | Ubuntu | esm-infra/bionic | * |
| Snapd | Ubuntu | esm-infra/focal | * |
| Snapd | Ubuntu | esm-infra/xenial | * |
| Snapd | Ubuntu | jammy | * |
| Snapd | Ubuntu | noble | * |
| Snapd | Ubuntu | questing | * |
| Snapd | Ubuntu | snap | * |
| Snapd | Ubuntu | upstream | * |