Количество 5
Количество 5
CVE-2026-3888
Local privilege escalation in snapd in Ubuntu on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is enabled to automatically clean up this directory.
CVE-2026-3888
Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
CVE-2026-3888
Local privilege escalation in snapd on Linux allows local attackers to ...
GHSA-grpw-jgrw-ccqr
Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
BDU:2026-03419
Уязвимость службы snapd операционных систем Ubuntu, позволяющая нарушителю повысить свои привилегии до уровня root
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2026-3888 Local privilege escalation in snapd in Ubuntu on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is enabled to automatically clean up this directory. | CVSS3: 7.8 | 0% Низкий | 9 дней назад | |
CVE-2026-3888 Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS. | CVSS3: 7.8 | 0% Низкий | 9 дней назад | |
CVE-2026-3888 Local privilege escalation in snapd on Linux allows local attackers to ... | CVSS3: 7.8 | 0% Низкий | 9 дней назад | |
GHSA-grpw-jgrw-ccqr Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS. | CVSS3: 7.8 | 0% Низкий | 9 дней назад | |
BDU:2026-03419 Уязвимость службы snapd операционных систем Ubuntu, позволяющая нарушителю повысить свои привилегии до уровня root | CVSS3: 7.8 | 0% Низкий | 9 дней назад |
Уязвимостей на страницу