Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6170-1 | snapd security update |
Ubuntu USN |
USN-8102-1 | snapd vulnerability |
Ubuntu USN |
USN-8102-2 | snapd regression |
Wed, 18 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical ubuntu |
|
| Vendors & Products |
Canonical
Canonical ubuntu |
Wed, 18 Mar 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 18 Mar 2026 00:15:00 +0000
Tue, 17 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS. | |
| Title | Local Privilege Escalation in snapd | |
| Weaknesses | CWE-268 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2026-03-18T08:59:07.522Z
Reserved: 2026-03-10T16:03:08.583Z
Link: CVE-2026-3888
Updated: 2026-03-18T03:02:10.640Z
Status : Awaiting Analysis
Published: 2026-03-17T14:16:17.410
Modified: 2026-03-18T04:17:30.720
Link: CVE-2026-3888
No data.
OpenCVE Enrichment
Updated: 2026-03-24T10:49:18Z
Debian DSA
Ubuntu USN