Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2026-3888

Опубликовано: 17 мар. 2026
Источник: ubuntu
Приоритет: high
EPSS Низкий
CVSS3: 7.8

Описание

Local privilege escalation in snapd in Ubuntu on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is enabled to automatically clean up this directory.

РелизСтатусПримечание
devel

pending

2.74.1+ubuntu26.04.1
esm-infra/bionic

released

2.61.4ubuntu0.18.04.1+esm2
esm-infra/focal

released

2.67.1+20.04ubuntu1~esm1
esm-infra/xenial

released

2.61.4ubuntu0.16.04.1+esm2
jammy

released

2.73+ubuntu22.04.1
noble

released

2.73+ubuntu24.04.2
questing

released

2.73+ubuntu25.10.1
snap

pending

2.75.1
upstream

pending

2.75.1

Показывать по

EPSS

Процентиль: 0%
0.00005
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
9 дней назад

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

CVSS3: 7.8
debian
9 дней назад

Local privilege escalation in snapd on Linux allows local attackers to ...

CVSS3: 7.8
github
9 дней назад

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

CVSS3: 7.8
fstec
9 дней назад

Уязвимость службы snapd операционных систем Ubuntu, позволяющая нарушителю повысить свои привилегии до уровня root

EPSS

Процентиль: 0%
0.00005
Низкий

7.8 High

CVSS3