Tag

Cve 2026 3888

All articles tagged with #cve 2026 3888

Ubuntu patches timer-based root access (CVE-2026-3888)
security3 hours ago

Ubuntu patches timer-based root access (CVE-2026-3888)

Ubuntu Desktop 24.04+ is patched for CVE-2026-3888, a high-severity local privilege-escalation that can occur via a timing window in systemd-tmpfiles cleanup interacting with snap-confine. An unprivileged attacker could wait for the cleanup to delete /tmp/.snap, recreate it with a payload, and have it bound as root on the next sandbox initialization. Patches are available through updated snapd versions across Ubuntu 24.04.x, 25.10.x, 26.04.x, and upstream; exploitation requires a 10–30 day window and no user interaction. The report also notes a separate race-condition in uutils coreutils that could enable root-level file operations during cron, mitigated by reverting rm to GNU coreutils in Ubuntu 25.10 and applying upstream uutils fixes. Users should apply the patched snapd updates to mitigate risk.

technology5 hours ago

Ubuntu Snap Local Privilege Escalation CVE-2026-3888 Prompts Patch Rollout

A high-severity local privilege escalation in Ubuntu's snapd (CVE-2026-3888) could let a local user recreate the snap private /tmp directory when systemd-tmpfiles runs, enabling root access. Qualys-discovered flaw has prompted patches across Ubuntu releases, with 24.04 LTS and 25.10 affected out-of-the-box; Ubuntu 22.04 LTS and older are only impacted in non-default configurations.