Home / mailingsPDF  

[USN-8102-1] snapd vulnerability

Posted on 17 March 2026
Ubuntu Security

==========================================================================Ubuntu Security Notice USN-8102-1
March 17, 2026

snapd vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

snapd could be used to escalate privilege

Software Description:
- snapd: Daemon and tooling that enable snap packages

Details:

Qualys discovered that snapd incorrectly handled certain operations in the
snap's private /tmp directory. If systemd-tmpfiles is enabled to automatically
clean up this directory, a local attacker could possibly use this issue to
re-create the deleted directory, resulting in privilege escalation.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 25.10
snapd 2.73+ubuntu25.10.1

Ubuntu 24.04 LTS
snapd 2.73+ubuntu24.04.1

Ubuntu 22.04 LTS
snapd 2.73+ubuntu22.04.1

Ubuntu 20.04 LTS
snapd 2.67.1+20.04ubuntu1~esm1
Available with Ubuntu Pro

Ubuntu 18.04 LTS
snapd 2.61.4ubuntu0.18.04.1+esm2
Available with Ubuntu Pro

Ubuntu 16.04 LTS
snapd 2.61.4ubuntu0.16.04.1+esm2
Available with Ubuntu Pro

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-8102-1
CVE-2026-3888

Package Information:
https://launchpad.net/ubuntu/+source/snapd/2.73+ubuntu25.10.1
https://launchpad.net/ubuntu/+source/snapd/2.73+ubuntu24.04.1
https://launchpad.net/ubuntu/+source/snapd/2.73+ubuntu22.04.1

--===============5957193726571927561==Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature

 

TOP