PT-2026-25897 · Canonical · Ubuntu 16.04 Lts+4
Published
2026-03-17
·
Updated
2026-03-17
·
CVE-2026-3888
CVSS v3.1
7.8
| Vector | AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.
Fix
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Ubuntu 16.04 Lts
Ubuntu 18.04 Lts
Ubuntu 20.04 Lts
Ubuntu 22.04 Lts
Ubuntu 24.04 Lts