CVE-2026-3888 PUBLISHED

Local Privilege Escalation in snapd

Assigner: canonical
Reserved: 10.03.2026 Published: 17.03.2026 Updated: 17.03.2026

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

Metrics

CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS Score: 7.8

Product Status

Package Collection https://github.com/canonical
Package Name snapd
Versions Default: unaffected
  • affected from 0 to 2.75.1 (excl.)
Vendor Canonical
Product Ubuntu 16.04 LTS
Versions Default: affected
  • unaffected from 2.61.4ubuntu0.16.04.1+esm2 to * (excl.)
Vendor Canonical
Product Ubuntu 18.04 LTS
Versions Default: affected
  • unaffected from 2.61.4ubuntu0.18.04.1+esm2 to * (excl.)
Vendor Canonical
Product Ubuntu 20.04 LTS
Versions Default: affected
  • unaffected from 2.67.1+20.04ubuntu1~esm1 to * (excl.)
Vendor Canonical
Product Ubuntu 22.04 LTS
Versions Default: affected
  • unaffected from 2.73+ubuntu22.04.1 to * (excl.)
Vendor Canonical
Product Ubuntu 24.04 LTS
Versions Default: affected
  • unaffected from 2.73+ubuntu24.04.1 to * (excl.)

Credits

  • Qualys Security Advisory Team finder

References

Problem Types

  • CWE-268 Privilege chaining CWE

Impacts

  • CAPEC-233 Privilege Escalation