
[CIVN-2026-0156] Local Privilege Escalation Vulnerability in Ubuntu
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Local Privilege Escalation Vulnerability in Ubuntu
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
Ubuntu 16.04 LTS – snapd versions prior to 2.61.4ubuntu0.16.04.1+esm2
Ubuntu 18.04 LTS – snapd versions prior to 2.61.4ubuntu0.18.04.1+esm2
Ubuntu 20.04 LTS – snapd versions prior to 2.67.1+20.04ubuntu1~esm1
Ubuntu 22.04 LTS – snapd versions prior to 2.73+ubuntu22.04.1
Ubuntu 24.04 LTS – snapd versions prior to 2.73+ubuntu24.04.2
Ubuntu 25.10 LTS – snapd versions prior to 2.73+ubuntu25.10.1
Overview
A vulnerability has been reported in Ubuntu Linux, which could allow a local attacker to escalate privileges to root on the targeted system.
Target Audience:
All end-user organizations and individuals using Ubuntu Linux systems.
Risk Assessment:
High risk of full system compromise.
Impact Assessment:
Potential impact on confidentiality, integrity, and availability of the system.
Description
Snap is a software packaging and deployment system used in Ubuntu to manage applications and their dependencies in a secure and isolated manner.
A local privilege escalation vulnerability exists in Snap due to improper handling of certain operations and insufficient restriction mechanisms. An attacker with local access could exploit this flaw by re-creating snap¿s private /tmp directory when systemd-tmpfiles is enabled to automatically clean up this directory.
Successful exploitation of this vulnerability could allow a local attacker to escalate privileges to root on the targeted system
Solution
Apply appropriate security updates as mentioned in:
https://ubuntu.com/security/CVE-2026-3888
Vendor Information
Ubuntu
https://ubuntu.com/
References
https://ubuntu.com/security/CVE-2026-3888
CVE Name
CVE-2026-3888
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnD8DcACgkQ3jCgcSdc
ys+V7Q//SCFFe5G7P59I2MIpFVKs081yoQCVzv37jGnJixHVnSvLUZBOZqczAeoX
L1SbomgohYEqdl2SIdBFD+QvbbdkT00fciJTVyvgjW72zSYxpACBpnEu2OafwGc9
igqDtbl4W8ODEzZ5f05KoBoFqJuj0eX/iAMy0jkEH0Fir7D3zbePXssUQnaz2kjI
1ui+J8d0E2Nti+Yt5sZLplHJz1Oqqtd1eSf5BdIfXxRZDqOfp1cVJamBJgCK8JDl
CapYCB0osNeURq3s7mnDO6PJJROOKsS4JVny6yIiJXFxVkuEnCl0OGzM5Yd1Dhmz
7Vs+4GDobHAg3zbZBti9CGh82iixU+IrsAdmZFa2aBg9YH043mXlfN7YQafQfdfk
xYL3HQnCGwKiukN2qqa+YihJz5IvaHNLFQC28YxEAbmwGstRLxmwAEdFXPAukyN1
5oD9KF8QmCUysd84c18Oo9IQUc0RxU5Z15HdqmDAh2hcvoTuVldFwukleDVKvKiM
7/2Hy55e0Lvw00E2mQO044ddeArYS384W1OUstF5rZG5ZUw+rlOjQdrJy5MhMFAK
KJf/Q+sSH5vHNnqPYVObaDnS9YIfMkCWbr+ApQlddmd9dppfpsz1/1UfYwU3TBcq
AFPN9fzeBuMddaOpjWNKTFr7+9npDOGtiUAAK39tOIdoCXEx2So=
=JLnt
—–END PGP SIGNATURE—–


