Home / mailings [USN-8102-1] snapd vulnerability
Posted on 17 March 2026
Ubuntu Security==========================================================================Ubuntu Security Notice USN-8102-1
March 17, 2026
snapd vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
snapd could be used to escalate privilege
Software Description:
- snapd: Daemon and tooling that enable snap packages
Details:
Qualys discovered that snapd incorrectly handled certain operations in the
snap's private /tmp directory. If systemd-tmpfiles is enabled to automatically
clean up this directory, a local attacker could possibly use this issue to
re-create the deleted directory, resulting in privilege escalation.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.10
snapd 2.73+ubuntu25.10.1
Ubuntu 24.04 LTS
snapd 2.73+ubuntu24.04.1
Ubuntu 22.04 LTS
snapd 2.73+ubuntu22.04.1
Ubuntu 20.04 LTS
snapd 2.67.1+20.04ubuntu1~esm1
Available with Ubuntu Pro
Ubuntu 18.04 LTS
snapd 2.61.4ubuntu0.18.04.1+esm2
Available with Ubuntu Pro
Ubuntu 16.04 LTS
snapd 2.61.4ubuntu0.16.04.1+esm2
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-8102-1
CVE-2026-3888
Package Information:
https://launchpad.net/ubuntu/+source/snapd/2.73+ubuntu25.10.1
https://launchpad.net/ubuntu/+source/snapd/2.73+ubuntu24.04.1
https://launchpad.net/ubuntu/+source/snapd/2.73+ubuntu22.04.1
--===============5957193726571927561==Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
