Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Aberystwyth University optimizes space weather forecasting

Bug in Ubuntu CVE-2026-3888 allows attackers to gain root by exploiting systemd cleanup timing

Experts call for new legislation as food insecurity rises in the UK

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Bug in Ubuntu CVE-2026-3888 allows attackers to gain root by exploiting systemd cleanup timing
Identity

Bug in Ubuntu CVE-2026-3888 allows attackers to gain root by exploiting systemd cleanup timing

By March 18, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananMarch 18, 2026Linux / Endpoint security

A high-severity security flaw affecting the default installation of Ubuntu Desktop versions 24.04 and later could be exploited to escalate privileges to the root level.

This issue, tracked as CVE-2026-3888 (CVSS score: 7.8), could allow an attacker to gain control of a susceptible system.

“This flaw (CVE-2026-3888) allows a local unprivileged attacker to escalate privileges to full root access through the interaction of two standard system components: snap-confine and systemd-tmpfiles,” said Qualys Threat Research Unit (TRU). “The exploit requires a specific time-based period (10-30 days), but results in a complete compromise of the host system.”

Qualys points out that the issue is due to an unintended interaction between snap-confine, which creates a sandbox and manages the execution environment for snap applications, and systemd-tmpfiles, which automatically cleans up temporary files and directories (such as /tmp, /run, and /var/tmp) that are older than a defined threshold.

This vulnerability is fixed in the following versions:

Ubuntu 24.04 LTS – snapd versions before 2.73+ubuntu24.04.1 Ubuntu 25.10 LTS – snapd versions before 2.73+ubuntu25.10.1 Ubuntu 26.04 LTS (Dev) – snapd versions before 2.74.1+ubuntu26.04.1 Upstream snapd – versions 2.75 prior to 2.73+ubuntu26.04.1

Although this attack requires low privileges and does not require user interaction, the time delay mechanism in the exploit chain increases the complexity of the attack.

“By default, systemd-tmpfiles is scheduled to delete old data in /tmp,” Qualys said. “An attacker could exploit this by manipulating the timing of these cleanup cycles.”

The attack unfolds as follows.

The attacker would have to wait for the system cleanup daemon to remove the critical directory (/tmp/.snap) required by snap-confine. The default period is 30 days on Ubuntu 24.04 and 10 days on later versions. Once removed, the attacker recreates the directory containing the malicious payload. During the next sandbox initialization, the snap-confine binding mounts these files as root, allowing arbitrary code execution within a privileged context.

Additionally, Qualys announced that it had discovered a race condition flaw in the uutils coreutils package. This flaw allows a local unprivileged attacker to replace directory entries with symbolic links (also known as symbolic links) during root-owned cron execution.

“A successful exploit could allow the attacker to delete arbitrary files as root or target the Snap Sandbox directory for further privilege escalation,” the cybersecurity firm said. “This vulnerability was reported and mitigated prior to the public release of Ubuntu 25.10. To immediately mitigate this risk, the default rm command in Ubuntu 25.10 was reverted to GNU coreutils. An upstream fix was then applied to the uutils repository.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleExperts call for new legislation as food insecurity rises in the UK
Next Article Aberystwyth University optimizes space weather forecasting

Related Posts

Apple fixes WebKit vulnerability that allows same-origin policy bypass on iOS and macOS

March 18, 2026

Critical flaw in unpatched Telnetd (CVE-2026-32746) enables unauthenticated route RCE over port 23

March 18, 2026

AI flaws in Amazon Bedrock, LangSmith, and SGLang enable data breaches and RCEs

March 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Aberystwyth University optimizes space weather forecasting

Bug in Ubuntu CVE-2026-3888 allows attackers to gain root by exploiting systemd cleanup timing

Experts call for new legislation as food insecurity rises in the UK

Early PFAS exposure is associated with bone density changes in adolescence

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.