{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreiaic7xjnotpg74bqcdu7ngkrvidk7no44ouqzsq672lk5rbqjnsum",
    "uri": "at://did:plc:b3tz6srl4ochk2wxn6dv6xpy/app.bsky.feed.post/3mhe2hmqwpwc2"
  },
  "path": "/Articles/1063453/",
  "publishedAt": "2026-03-18T15:34:34.000Z",
  "site": "https://lwn.net",
  "tags": [
    "discovered a local-privilege escalation (LPE) vulnerability",
    "security advisory",
    "instructions"
  ],
  "textContent": "Qualys has discovered a local-privilege escalation (LPE) vulnerability affecting Ubuntu Desktop 24.04 and later:\n\n> This flaw (CVE-2026-3888) allows an unprivileged local attacker to escalate privileges to full root access through the interaction of two standard system components: snap-confine and systemd-tmpfiles.\n\nMore details are available in the security advisory. Canonical has published updated packages as well as instructions for verifying if a system is vulnerable and how to upgrade if so.",
  "title": "Local-privilege escalation in snapd"
}