CVE-2026-3888: Important Snap Flaw Enables Local Privilege Escalation to Root

4 hours ago (blog.qualys.com)

It is possible to just not use snap on ubuntu. The few ubuntu servers we have, even the couple with a minimal XFCE interface for some gui pieces, don't have snap installed. I realise local exploits happen all the time, but why add a whole new huge surface area if I don't have to.

When will these distros accept suid was a mistake and disable it. It has lead to critical local privilege escalation exploits so many times.

I wonder if, and this is just speculating not trying to start an arguement, if this sort of thing could have happened in the simpler pre-snap, pre-systemd systems? More to the point is this a cause of using more complicated software?

  • Permission and timing gotchas in /tmp predate snap and systemd. It's why things like `mkstemp` exist.

    I remember cron jobs that did what systemd-tmpfiles-clean does before it existed. All unix daemons using /tmp run the risk of misusing /tmp. I don't know snap well enough to say anything about it makes it uniquely more susceptible to that.

[flagged]