Ubuntu Desktop 24.04及更高版本默认安装存在高危安全漏洞CVE-2026-3888,CVSS评分7.8。该漏洞允许本地无特权攻击者通过snap-confine和systemd-tmpfiles组件交互实现完全root权限提升。攻击需要特定时间窗口(10-30天),利用系统清理守护进程删除关键目录/tmp/.snap的时机,攻击者可重建恶意目录并在下次沙盒初始化时执行任意代码。
A vulnerability in the interaction between snapd and systemd under Ubuntu allows attackers to gain root access.
CVE-2026-3888 is a high-severity Local Privilege Escalation (LPE) vulnerability that allows unprivileged users to gain full root access on default installations of Ubuntu 24.04 LTS and later.
Ubuntu developers have fixed a series of vulnerabilities that made it easy for standard users to gain coveted root privileges. “This blog post is about an astonishingly straightforward way to escalate ...
A newly identified local privilege escalation (LPE) vulnerability has been discovered affecting default installations of ...
Two vulnerabilities in the Ubuntu implementation of a popular container-based file system allow attackers to execute code with root privileges on 40% of Ubuntu Linux cloud workloads, researchers have ...
Logging in as the root user should never be done on Linux. Using the root account could lead to disaster. Sudo is the preferred method of gaining elevated privileges. When I first started using Linux ...
Sometimes the path to root is not a flashy kernel exploit or a broken login prompt. It is a temp directory that gets cleaned up at the wrong moment. A newly disclosed flaw, CVE-2026-3888, affects ...