Yet another critical vulnerability in systemd, this time involving snapd. Ubuntu folk are affected.

“A serious security issue has been discovered in Ubuntu, and it is gaining attention in the cybersecurity community. The vulnerability is identified as CVE-2026-3888 and mainly affects Ubuntu Desktop systems from version 24.04 onwards. This flaw is dangerous because it allows an attacker with limited access to gain full root privileges. Root access means complete control over the entire system.”

  • LiveLM@lemmy.zip
    link
    fedilink
    English
    arrow-up
    13
    ·
    edit-2
    2 days ago

    Reading the post, the issue is more on Snap’s side and the way Ubuntu configures it than on Systemd.

    Ubuntu automatically deletes old files from the /tmp directory after a certain number of days. During this cleanup, an important directory used by snap-confine may get removed. This creates an opportunity for the attacker to act. Once the directory is deleted, the attacker quickly recreates it with malicious content.

    In this scenario, a cron job could trigger it too.

    • Lucy :3@feddit.org
      link
      fedilink
      arrow-up
      3
      ·
      2 days ago

      And that’s why you use at least very basic owner/group and mod permission validation on internal files