Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit

The Hacker News by The Hacker News
March 18, 2026
Home Cybersecurity
Share on FacebookShare on Twitter


Ravie LakshmananMar 18, 2026Linux / Endpoint Security

A high-severity security flaw affecting default installations of Ubuntu Desktop versions 24.04 and later could be exploited to escalate privileges to the root level.

Tracked as CVE-2026-3888 (CVSS score: 7.8), the issue could allow an attacker to seize control of a susceptible system.

“This flaw (CVE-2026-3888) allows an unprivileged local attacker to escalate privileges to full root access through the interaction of two standard system components: snap-confine and systemd-tmpfiles,” the Qualys Threat Research Unit (TRU) said. “While the exploit requires a specific time-based window (10–30 days), the resulting impact is a complete compromise of the host system.” 

The problem, Qualys noted, stems from the unintended interaction of snap-confine, which manages execution environments for snap applications by creating a sandbox, and systemd-tmpfiles, which automatically cleans up temporary files and directories (e.g.,/tmp, /run, and /var/tmp) older than a defined threshold.

The vulnerability has been patched in the following versions –

  • Ubuntu 24.04 LTS – snapd versions prior to 2.73+ubuntu24.04.1
  • Ubuntu 25.10 LTS – snapd versions prior to 2.73+ubuntu25.10.1
  • Ubuntu 26.04 LTS (Dev) – snapd versions prior to 2.74.1+ubuntu26.04.1
  • Upstream snapd – versions prior to 2.75

The attack requires low privileges and no user interaction, although the attack complexity is high due to the time-delay mechanism in the exploit chain.

“In default configurations, systemd-tmpfiles is scheduled to remove stale data in /tmp,” Qualys said. “An attacker can exploit this by manipulating the timing of these cleanup cycles.”

The attack plays out in the following manner –

  • The attacker must wait for the system’s cleanup daemon to delete a critical directory (/tmp/.snap) required by snap-confine. The default period is 30 days in Ubuntu 24.04 and 10 days in later versions.
  • Once deleted, the attacker recreates the directory with malicious payloads.
  • During the next sandbox initialization, snap-confine bind mounts these files as root, allowing the execution of arbitrary code within the privileged context.

In addition, Qualys said it discovered a race condition flaw in the uutils coreutils package that allows an unprivileged local attacker to replace directory entries with symbolic links (aka symlinks) during root-owned cron executions.

“Successful exploitation could lead to arbitrary file deletion as root or further privilege escalation by targeting snap sandbox directories,” the cybersecurity company said. “The vulnerability was reported and mitigated prior to the public release of Ubuntu 25.10. The default rm command in Ubuntu 25.10 was reverted to GNU coreutils to mitigate this risk immediately. Upstream fixes have since been applied to the uutils repository.”



Source link

The Hacker News

The Hacker News

Next Post
IBM Fellow and Quantum Pioneer Charles H. Bennett Receives A.M. Turing Award, Computing’s Highest Honor

IBM Fellow and Quantum Pioneer Charles H. Bennett Receives A.M. Turing Award, Computing's Highest Honor

Recommended.

Nvidia Seeks To Tap Into Global Real Estate Firm’s Data Center Business

Nvidia Seeks To Tap Into Global Real Estate Firm’s Data Center Business

February 11, 2025
AI Chip Startups Seek An Edge By Enlisting The Channel

AI Chip Startups Seek An Edge By Enlisting The Channel

August 6, 2025

Trending.

Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks

Cybercrime Groups Using Vishing and SSO Abuse in Rapid SaaS Extortion Attacks

May 1, 2026
Global AI Innovators Welcomed as WAIC Opens Applications for 2026 SAIL Award With 0,000+ Prize Pool

Global AI Innovators Welcomed as WAIC Opens Applications for 2026 SAIL Award With $280,000+ Prize Pool

April 2, 2026
Intel Gives Bullish CPU Outlook With .2B Ireland Fab Deal

Intel Gives Bullish CPU Outlook With $14.2B Ireland Fab Deal

April 1, 2026
Armada to Deliver Sovereign AI at the Edge with Microsoft Azure Local

Armada to Deliver Sovereign AI at the Edge with Microsoft Azure Local

April 1, 2026
EPG Adds Over US0 Million in Series B+ Financing, Expanding Strategic Backing for Global AI Data Center Growth

EPG Adds Over US$100 Million in Series B+ Financing, Expanding Strategic Backing for Global AI Data Center Growth

March 31, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio