CVE-2026-3888:重要的Snap漏洞允许本地权限提升至root。
CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root

原始链接: https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-3888-important-snap-flaw-enables-local-privilege-escalation-to-root

## Ubuntu Snapd 漏洞摘要 (CVE-2026-3888) Qualys 威胁研究团队发现了一个高危的本地权限提升 (LPE) 漏洞,影响 Ubuntu Desktop 24.04 及更高版本的默认安装。该漏洞源于 `snap-confine` 和 `systemd-tmpfiles` 之间的交互,允许本地攻击者获得完全 root 权限。 利用该漏洞需要特定的时间窗口 – 等待 `systemd-tmpfiles` 清理一个临时目录 (`/tmp/.snap`),然后用恶意内容重新创建它。`snap-confine` 在初始化 snap 沙箱时,会将这些文件以 root 身份挂载,从而实现代码执行。虽然复杂 (CVSS 分数 7.8),但成功利用将完全破坏系统。 **受影响的系统应立即更新至:** * Ubuntu 24.04 LTS: snapd 2.73+ubuntu24.04.2 或更高版本 * Ubuntu 25.10 LTS: snapd 2.73+ubuntu25.10.1 或更高版本 * Ubuntu 26.04 LTS (开发版): snapd 2.74.1+ubuntu26.04.1 或更高版本 * 上游 snapd: 2.75 或更高版本 此外,在 Ubuntu 25.10 发布之前,已识别并修复了 `uutils coreutils` 包中的一个单独漏洞,防止潜在的 root 级别文件删除。Qualys 提供 QID (386810) 用于检测,以及 CyberSecurity Asset Management 和 VMDR 等工具用于漏洞识别和修复。

Snap软件包管理系统存在一个严重的安全漏洞(CVE-2026-3888),允许本地权限提升至root权限。Qualys发现了该漏洞位于Snap的隔离系统中,建议查阅他们的技术公告了解详情([https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-sys...](https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-sys...))。 Hacker News上的讨论还揭示了`uutils coreutils`(GNU coreutils的Rust重写版)中一个独立的、现已修复的本地权限提升漏洞,该漏洞险些随Ubuntu 25.10发布。这表明即使是Rust代码也并非完全没有问题,例如竞态条件,尤其是在跨API边界时。 评论员认为`uutils`漏洞源于仓促发布且缺乏充分测试,并质疑Snap和systemd等增加系统复杂性是否会导致此类漏洞。然而,也有人指出权限和时机问题在类Unix系统中一直存在。
相关文章

原文

The Qualys Threat Research Unit has identified a Local Privilege Escalation (LPE) vulnerability affecting default installations of Ubuntu Desktop version 24.04 and later. This flaw (CVE-2026-3888) allows an unprivileged local attacker to escalate privileges to full root access through the interaction of two standard system components: snap-confine and systemd-tmpfiles.

While the exploit requires a specific time-based window (10–30 days), the resulting impact is a complete compromise of the host system.

The vulnerability stems from an unintended interaction between two privileged utilities:

  • snap-confine: Manages execution environments for snap applications (set-user-ID-root or set capabilities).
  • systemd-tmpfiles: Automatically cleans up temporary files and directories older than a defined threshold.

Additionally, during the review process for Ubuntu 25.10, a separate vulnerability in the uutils coreutils package was identified and mitigated prior to release through proactive collaboration with the Ubuntu Security Team; more details on that finding follow below.

What is the attack surface for CVE-2026-3888?

snapd is the background service that manages the entire Snap ecosystem on Ubuntu. It handles discovery, installation, updates, and removal of snap packages — self-contained application bundles that ship with their own dependencies rather than relying on shared system libraries. Canonical designed the format to solve dependency conflicts and give publishers a single packaging target across Ubuntu versions. snapd also enforces the permission model that governs what each snap can access on the host system, making it both a package manager and a security policy engine.

Understanding snapd matters here because the two components below, snap-confine and systemd-tmpfiles, operate within or alongside this framework. snap-confine is the enforcement arm that actually builds the sandbox snapd defines, and systemd-tmpfiles handles the volatile filesystem plumbing that both snaps and system services depend on.

snap-confine: snap-confine is the setuid root binary that builds the sandbox before a snap app runs. It handles mount namespace isolation, cgroup enforcement, AppArmor policy loading, and seccomp filtering—the full confinement stack that keeps snaps from leaving their boundaries. Because it runs with elevated privileges to set up kernel-level isolation for regular users, it sits at a critical trust boundary. A bug like CVE-2026-3888 in this component could lead to privilege escalation, which makes consistent snapd patching a practical priority.

systemd-tmpfiles: systemd-tmpfiles manages the lifecycle of volatile directories like /tmp, /run, and /var/tmp — creating them with the right ownership at boot and cleaning out stale files on a timer. Configuration lives in drop-in files under /etc/tmpfiles.d/, /run/tmpfiles.d/, and /usr/lib/tmpfiles.d/. Poorly configured tmpfiles rules can create local escalation paths and open the door to symlink races and local escalation.

Exploitation Mechanism:

CVE-2026-3888 is rated High severity with a CVSS v3.1 score of 7.8 out of 10. The vector string (AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H) indicates a local attack vector with high complexity, requiring low privileges and no user interaction. The scope is changed, meaning a successful exploit can impact resources beyond the vulnerable component, with high impact across confidentiality, integrity, and availability.

While the CVSS score reflects a High severity, the Attack Complexity is High due to an inherent time-delay mechanism in the exploit chain. In default configurations, systemd-tmpfiles is scheduled to remove stale data in /tmp. An attacker can exploit this by manipulating the timing of these cleanup cycles. Specifically, the attack vector involves:

  1. The attacker must wait for the system’s cleanup daemon (30 days in Ubuntu 24.04; 10 days in later versions) to delete a critical directory (/tmp/.snap) required by snap-confine.
  2. Once deleted, the attacker recreates the directory with malicious payloads.
  3. During the next sandbox initialization, snap-confine bind-mounts these files as root, allowing the execution of arbitrary code within the privileged context.

The following snapd package versions are vulnerable. Organizations should upgrade immediately to the listed patched releases:

  • Ubuntu 24.04 LTS: snapd versions prior to 2.73+ubuntu24.04.2
  • Ubuntu 25.10 LTS: snapd versions prior to 2.73+ubuntu25.10.1
  • Ubuntu 26.04 LTS (Dev): snapd versions prior to 2.74.1+ubuntu26.04.1
  • Upstream snapd: versions prior to 2.75

Legacy Systems (16.04–22.04 LTS): While not vulnerable in default configurations, it is recommended to apply the patch to these versions as well. This precaution mitigates risks associated with non-default configurations that may mimic the behavior of newer releases.

Organizations running Ubuntu Desktop >= 24.04 should apply the patches immediately.

Technical Details

You can find the technical details of these vulnerabilities at: 

https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-systemd-tmpfiles.txt

Secondary Finding: Vulnerability in Ubuntu 25.10 uutils Coreutils

In a proactive security effort prior to the release of Ubuntu Desktop 25.10, the Qualys Threat Research Unit assisted the Ubuntu Security Team in reviewing the uutils coreutils package (a Rust rewrite of standard GNU utilities).

A race condition in the rm utility allowed an unprivileged local attacker to replace directory entries with symlinks during root-owned cron executions (specifically /etc/cron.daily/apport). Successful exploitation could lead to arbitrary file deletion as root or further privilege escalation by targeting snap sandbox directories.

The vulnerability was reported and mitigated prior to the public release of Ubuntu 25.10. The default rm command in Ubuntu 25.10 was reverted to GNU coreutils to mitigate this risk immediately. Upstream fixes have since been applied to the uutils repository.

Qualys QID Coverage for Detecting the CVE-2026-3888:

Qualys is releasing the QIDs in the table below as they become available.

QIDTitleVulnSigs Version
 386810Ubuntu Snapd Local Privilege Escalation (LPE) VulnerabilityVULNSIGS-2.6.561-4

Please check the Qualys Vulnerability Knowledgebase for the full list of coverage for this vulnerability.

Discover Vulnerable Assets with Qualys CyberSecurity Asset Management

The initial and crucial step in managing this critical vulnerability and mitigating associated risks is identifying all assets susceptible to this issue. Use CyberSecurity Asset Management 3.0 with External Attack Surface Management to identify your organization’s internet-facing instances and container/Kubernetes nodes that have vulnerable versions of the snap vulnerability.

In the following example, we aim to identify all assets running Ubuntu:

operatingSystem. name: ["Ubuntu"]

software:(name:"apparmor")

CyberSecurity Asset Management maintains a catalog of hardware and software lifecycle data built and curated by a dedicated research team, covering over 5,500 software publishers and 300,000 software releases, with automated daily updates to all CyberSecurity Asset Management customers.

Enhancing Your Security Posture with Qualys VMDR to Detect and Remediate the CVE-2026-3888 Vulnerability

Qualys VMDR provides comprehensive coverage and visibility into vulnerabilities, empowering organizations to rapidly respond, prioritize, and mitigate associated risks. Additionally, Qualys customers can leverage Qualys Patch Management to effectively remediate these vulnerabilities.

Leverage the power of Qualys VMDR alongside TruRiskTM and the Qualys Query Language (QQL) to efficiently identify and prioritize vulnerable assets, including container and Kubernetes nodes, effectively addressing the vulnerabilities highlighted above.

Use this QQL statement:

vulnerabilities.vulnerability.qid: 386810

Automatically Patch CVE-2026-3888 with Qualys Patch Management

Patches for this vulnerability are available. Qualys Patch Management can automatically deploy those patches to vulnerable assets when they become available.

Customers can use the “patch now” button found to the right of the vulnerability to add this vulnerability to a patch job. Once patches are released, Qualys will find the relevant patches for this vulnerability and automatically add those patches to a patch job. This will allow customers to deploy those patches to vulnerable devices, all from the Qualys platform.


Explore the power of the Qualys Enterprise TruRisk Platform or Enterprise TruRisk Management and get a unified view of risk today.


联系我们 contact @ memedata.com