CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root
41 points - today at 3:43 PM
SourceComments
ptx today at 6:09 PM
Better to follow the link to the technical details and just read those: https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-sys...
The article linked in the submission is more verbose but less clear and half of it is an advertisement for their product.
ifh-hn today at 6:13 PM
I wonder if, and this is just speculating not trying to start an arguement, if this sort of thing could have happened in the simpler pre-snap, pre-systemd systems? More to the point is this a cause of using more complicated software?
capitainenemo today at 7:56 PM
It is possible to just not use snap on ubuntu. The few ubuntu servers we have, even the couple with a minimal XFCE interface for some gui pieces, don't have snap installed. I realise local exploits happen all the time, but why add a whole new huge surface area if I don't have to.
rglover today at 7:31 PM
Semi-related: does anybody know of a reliable API that announces CVEs as they're published?
Edit: for others who may be curious https://www.cve.org/Downloads
charcircuit today at 7:51 PM
When will these distros accept suid was a mistake and disable it. It has lead to critical local privilege escalation exploits so many times.
cyberpunk today at 6:08 PM
[flagged]