{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiaic7xjnotpg74bqcdu7ngkrvidk7no44ouqzsq672lk5rbqjnsum",
"uri": "at://did:plc:b3tz6srl4ochk2wxn6dv6xpy/app.bsky.feed.post/3mhe2hmqwpwc2"
},
"path": "/Articles/1063453/",
"publishedAt": "2026-03-18T15:34:34.000Z",
"site": "https://lwn.net",
"tags": [
"discovered a local-privilege escalation (LPE) vulnerability",
"security advisory",
"instructions"
],
"textContent": "Qualys has discovered a local-privilege escalation (LPE) vulnerability affecting Ubuntu Desktop 24.04 and later:\n\n> This flaw (CVE-2026-3888) allows an unprivileged local attacker to escalate privileges to full root access through the interaction of two standard system components: snap-confine and systemd-tmpfiles.\n\nMore details are available in the security advisory. Canonical has published updated packages as well as instructions for verifying if a system is vulnerable and how to upgrade if so.",
"title": "Local-privilege escalation in snapd"
}