Yet another critical vulnerability in systemd, this time involving snapd. Ubuntu folk are affected.
“A serious security issue has been discovered in Ubuntu, and it is gaining attention in the cybersecurity community. The vulnerability is identified as CVE-2026-3888 and mainly affects Ubuntu Desktop systems from version 24.04 onwards. This flaw is dangerous because it allows an attacker with limited access to gain full root privileges. Root access means complete control over the entire system.”
Oh snap!
Why did people move away from sysvinit again?
Reading the post, the issue is more on Snap’s side and the way Ubuntu configures it than on Systemd.
Ubuntu automatically deletes old files from the /tmp directory after a certain number of days. During this cleanup, an important directory used by snap-confine may get removed. This creates an opportunity for the attacker to act. Once the directory is deleted, the attacker quickly recreates it with malicious content.
In this scenario, a cron job could trigger it too.
And that’s why you use at least very basic owner/group and mod permission validation on internal files
Ah, well, yet another mark against using snap then. My bad. Thanks for letting me know. :)





