Yet another critical vulnerability in systemd, this time involving snapd. Ubuntu folk are affected.

“A serious security issue has been discovered in Ubuntu, and it is gaining attention in the cybersecurity community. The vulnerability is identified as CVE-2026-3888 and mainly affects Ubuntu Desktop systems from version 24.04 onwards. This flaw is dangerous because it allows an attacker with limited access to gain full root privileges. Root access means complete control over the entire system.”

  • ChrisG@lemmy.worldOP
    link
    fedilink
    English
    arrow-up
    2
    arrow-down
    5
    ·
    6 hours ago

    If you think about it for even a minute this is still a glaring cve in systemd, exposed in this case, by misbehaving snapd. systemd still needed to be patched and so did snapd.

    • villainy@lemmy.world
      link
      fedilink
      arrow-up
      6
      ·
      5 hours ago

      Ubuntu configures systemd-tmpfiles to delete a snapd tmp dir, snapd runs setuid root and blindly trusts/executes files from a tmp dir it does not manage the life cycle of. Where is the flaw in systemd here?