Description

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

INFO

Published Date :

2026-03-17T14:02:08.475Z

Last Modified :

2026-03-18T08:59:07.522Z

Source :

canonical
AFFECTED PRODUCTS

The following products are affected by CVE-2026-3888 vulnerability.

Vendors Products
Canonical
  • Ubuntu

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact