Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头,直接写描述。好的,首先我需要仔细阅读这篇文章,抓住关键点。 文章主要讲的是Ubuntu Desktop 24.04及以后版本的一个高危安全漏洞,编号CVE-2026-3888。这个漏洞允许攻击者通过snap-confine和systemd-tmpfiles的交互来提升权限到root级别。攻击需要特定的时间窗口,比如10到30天,一旦成功就能完全控制主机系统。 此外,文章还提到了另一个漏洞,在uutils coreutils包中发现了一个竞态条件问题,允许攻击者替换目录条目为符号链接,进而可能导致文件删除或进一步权限提升。这个漏洞在Ubuntu 25.10发布前已经修复,并且默认的rm命令改回了GNU coreutils。 现在我需要把这些信息浓缩到100字以内。重点包括:Ubuntu版本、漏洞编号、影响、攻击方式、时间窗口、修复情况以及另一个竞态条件漏洞及其影响。 可能的结构是:先说主要漏洞及其影响,然后提到修复情况和另一个漏洞。确保语言简洁明了,不使用复杂的术语。 比如:“Ubuntu 24.04及以上版本存在高危漏洞CVE-2026-3888,可被利用提升至root权限。该漏洞源于snap-confine与systemd-tmpfiles的交互,在特定时间窗口内触发。已发布补丁修复该问题。此外,uutils coreutils中发现竞态条件漏洞,可被用于替换目录条目为符号链接。” 这样大概在100字左右,并且涵盖了主要信息。 </think> Ubuntu 24.04及以上版本存在高危漏洞CVE-2026-3888,可被利用提升至root权限。该漏洞源于snap-confine与systemd-tmpfiles的交互,在特定时间窗口内触发。已发布补丁修复该问题。此外,uutils coreutils中发现竞态条件漏洞,可被用于替换目录条目为符号链接。 2026-3-18 08:8:0 Author: thehackernews.com(查看原文) 阅读量:12 收藏

Linux / Endpoint Security

A high-severity security flaw affecting default installations of Ubuntu Desktop versions 24.04 and later could be exploited to escalate privileges to the root level.

Tracked as CVE-2026-3888 (CVSS score: 7.8), the issue could allow an attacker to seize control of a susceptible system.

"This flaw (CVE-2026-3888) allows an unprivileged local attacker to escalate privileges to full root access through the interaction of two standard system components: snap-confine and systemd-tmpfiles," the Qualys Threat Research Unit (TRU) said. "While the exploit requires a specific time-based window (10–30 days), the resulting impact is a complete compromise of the host system." 

The problem, Qualys noted, stems from the unintended interaction of snap-confine, which manages execution environments for snap applications by creating a sandbox, and systemd-tmpfiles, which automatically cleans up temporary files and directories (e.g.,/tmp, /run, and /var/tmp) older than a defined threshold.

The vulnerability has been patched in the following versions -

  • Ubuntu 24.04 LTS - snapd versions prior to 2.73+ubuntu24.04.1
  • Ubuntu 25.10 LTS - snapd versions prior to 2.73+ubuntu25.10.1
  • Ubuntu 26.04 LTS (Dev) - snapd versions prior to 2.74.1+ubuntu26.04.1
  • Upstream snapd - versions prior to 2.75

The attack requires low privileges and no user interaction, although the attack complexity is high due to the time-delay mechanism in the exploit chain.

"In default configurations, systemd-tmpfiles is scheduled to remove stale data in /tmp," Qualys said. "An attacker can exploit this by manipulating the timing of these cleanup cycles."

The attack plays out in the following manner -

  • The attacker must wait for the system's cleanup daemon to delete a critical directory (/tmp/.snap) required by snap-confine. The default period is 30 days in Ubuntu 24.04 and 10 days in later versions.
  • Once deleted, the attacker recreates the directory with malicious payloads.
  • During the next sandbox initialization, snap-confine bind mounts these files as root, allowing the execution of arbitrary code within the privileged context.

In addition, Qualys said it discovered a race condition flaw in the uutils coreutils package that allows an unprivileged local attacker to replace directory entries with symbolic links (aka symlinks) during root-owned cron executions.

"Successful exploitation could lead to arbitrary file deletion as root or further privilege escalation by targeting snap sandbox directories," the cybersecurity company said. "The vulnerability was reported and mitigated prior to the public release of Ubuntu 25.10. The default rm command in Ubuntu 25.10 was reverted to GNU coreutils to mitigate this risk immediately. Upstream fixes have since been applied to the uutils repository."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/ubuntu-cve-2026-3888-bug-lets-attackers.html
如有侵权请联系:admin#unsafe.sh