Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2026-3888

Опубликовано: 17 мар. 2026
Источник: debian
EPSS Низкий

Описание

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
snapdunfixedpackage
snapdno-dsabookwormpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2026/03/17/8

  • https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-systemd-tmpfiles.txt

EPSS

Процентиль: 0%
0.00005
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
9 дней назад

Local privilege escalation in snapd in Ubuntu on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is enabled to automatically clean up this directory.

CVSS3: 7.8
nvd
9 дней назад

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

CVSS3: 7.8
github
9 дней назад

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

CVSS3: 7.8
fstec
9 дней назад

Уязвимость службы snapd операционных систем Ubuntu, позволяющая нарушителю повысить свои привилегии до уровня root

EPSS

Процентиль: 0%
0.00005
Низкий