[CIVN-2026-0156] Local Privilege Escalation Vulnerability in Ubuntu

By Published On: March 25, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Local Privilege Escalation Vulnerability in Ubuntu


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


Ubuntu 16.04 LTS – snapd versions prior to 2.61.4ubuntu0.16.04.1+esm2

Ubuntu 18.04 LTS – snapd versions prior to 2.61.4ubuntu0.18.04.1+esm2

Ubuntu 20.04 LTS – snapd versions prior to 2.67.1+20.04ubuntu1~esm1

Ubuntu 22.04 LTS – snapd versions prior to 2.73+ubuntu22.04.1

Ubuntu 24.04 LTS – snapd versions prior to 2.73+ubuntu24.04.2

Ubuntu 25.10 LTS – snapd versions prior to 2.73+ubuntu25.10.1

Overview


A vulnerability has been reported in Ubuntu Linux, which could allow a local attacker to escalate privileges to root on the targeted system.


Target Audience:

All end-user organizations and individuals using Ubuntu Linux systems.


Risk Assessment:

High risk of full system compromise.


Impact Assessment:

Potential impact on confidentiality, integrity, and availability of the system.


Description


Snap is a software packaging and deployment system used in Ubuntu to manage applications and their dependencies in a secure and isolated manner.


A local privilege escalation vulnerability exists in Snap due to improper handling of certain operations and insufficient restriction mechanisms. An attacker with local access could exploit this flaw by re-creating snap¿s private /tmp directory when systemd-tmpfiles is enabled to automatically clean up this directory.


Successful exploitation of this vulnerability could allow a local attacker to escalate privileges to root on the targeted system


Solution


Apply appropriate security updates as mentioned in:

https://ubuntu.com/security/CVE-2026-3888



Vendor Information


Ubuntu 

https://ubuntu.com/


References


 

https://ubuntu.com/security/CVE-2026-3888


CVE Name

CVE-2026-3888




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnD8DcACgkQ3jCgcSdc

ys+V7Q//SCFFe5G7P59I2MIpFVKs081yoQCVzv37jGnJixHVnSvLUZBOZqczAeoX

L1SbomgohYEqdl2SIdBFD+QvbbdkT00fciJTVyvgjW72zSYxpACBpnEu2OafwGc9

igqDtbl4W8ODEzZ5f05KoBoFqJuj0eX/iAMy0jkEH0Fir7D3zbePXssUQnaz2kjI

1ui+J8d0E2Nti+Yt5sZLplHJz1Oqqtd1eSf5BdIfXxRZDqOfp1cVJamBJgCK8JDl

CapYCB0osNeURq3s7mnDO6PJJROOKsS4JVny6yIiJXFxVkuEnCl0OGzM5Yd1Dhmz

7Vs+4GDobHAg3zbZBti9CGh82iixU+IrsAdmZFa2aBg9YH043mXlfN7YQafQfdfk

xYL3HQnCGwKiukN2qqa+YihJz5IvaHNLFQC28YxEAbmwGstRLxmwAEdFXPAukyN1

5oD9KF8QmCUysd84c18Oo9IQUc0RxU5Z15HdqmDAh2hcvoTuVldFwukleDVKvKiM

7/2Hy55e0Lvw00E2mQO044ddeArYS384W1OUstF5rZG5ZUw+rlOjQdrJy5MhMFAK

KJf/Q+sSH5vHNnqPYVObaDnS9YIfMkCWbr+ApQlddmd9dppfpsz1/1UfYwU3TBcq

AFPN9fzeBuMddaOpjWNKTFr7+9npDOGtiUAAK39tOIdoCXEx2So=

=JLnt

—–END PGP SIGNATURE—–

Share this article