Yet another critical vulnerability in systemd, this time involving snapd. Ubuntu folk are affected.

“A serious security issue has been discovered in Ubuntu, and it is gaining attention in the cybersecurity community. The vulnerability is identified as CVE-2026-3888 and mainly affects Ubuntu Desktop systems from version 24.04 onwards. This flaw is dangerous because it allows an attacker with limited access to gain full root privileges. Root access means complete control over the entire system.”

  • eksb@programming.dev
    link
    fedilink
    English
    arrow-up
    29
    arrow-down
    1
    ·
    9 days ago

    Yet another critical vulnerability in systemd

    This is a critical vulnerability in snapd, not systemd. It sounds like it could also be exploited if something other than systemd deleted the files in /tmp/. Or if /tmp/ was not mounted.

    • ChrisG@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      13
      ·
      8 days ago

      Yet another critical vulnerability in the much vaunted systemd has been exposed by a misbehaving app - in this case snapd.

      Both need patching.

        • ChrisG@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          2
          ·
          6 days ago

          Read the bug in the systemd repo. meanwhile the systemd cultists will defend it to the death. Look, if you value the positive aspects of systemd but dislike the cancerous assimilation of the entire userland, dinit is a perfectly good option.

      • FauxLiving@lemmy.world
        link
        fedilink
        arrow-up
        2
        arrow-down
        1
        ·
        6 days ago

        There is no systemd flaw here.

        snap-confine creates /tmp/.snap owned by root.

        systemd-tmpfiles can delete this directory because it also has root privileges. It will do so if the directory is inactive for, by default, 30 days. Files can be excluded from this by adding a .conf file to /etc/tmpfiles.d/, snap-confine does not do this.

        Because the files are not excluded they will be deleted. systemd-tmpfiles can do this because it is running as root.

        Once they are deleted a USER can recreate /tmp/.snap with malicious code.

        snap-confine never verifies that the directory is owned by root, and performs its security checks before its privileged file operations, creating a race window. Because snap-confine is setuid root, it then bind-mounts files from the attacker-controlled /tmp/.snap into the snap sandbox’s filesystem, allowing an attacker to execute arbitrary code as root.

        What is the systemd-tmpfiles flaw? It does exactly what it is supposed to do, and it provides a means to exclude directories from its process. snap doesn’t configure systemd to ignore the directories and it doesn’t perform appropriate checks on the directory’s ownership.

        • ChrisG@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          6 days ago

          Exactly. systemd has a glaring security hole that had to be kludged. As the OP I posted the article to warn non technical users of the danger but systemd defenders league are predictably blind to any possible flaw in their golden calf and cannot resist the temptation to rush to battle. yawn

          • FauxLiving@lemmy.world
            link
            fedilink
            arrow-up
            2
            ·
            6 days ago

            What is the security hole in systemd?

            You haven’t answered this.

            systemd-tmpfiles exists to delete inactive files in /tmp. That’s not a security flaw, that’s system maintenance. It’s the documented purpose of systemd-tmpfiles and it performs exactly was documented.

            The security hole is in snap-confine which does not verify that its own directory is owned by root before mounting it AS ROOT. That’s the security hole.

            So, again, what is the security hole in systemd-tmpfiles?

            If you don’t have an answer then just say so. Resorting to name calling and trying to frame this as if I’m the irrational one is absurd.

  • AcornTickler@sh.itjust.works
    link
    fedilink
    arrow-up
    5
    ·
    8 days ago

    When I need to create scratch files I usually operate in /tmp. Almost all directories there that I saw were using randomized paths (e.g. UUIDs). I guess this is to prevent problems mentioned in the article. So, I believe this would be a vulnerability of snap, not systemd.

    I use Fedora where /tmp is created as tmpfs, which lives in RAM and is cleared when the system is shut down. I wonder what’s the benefit of Ubuntu’s approach.

    • ChrisG@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      5
      ·
      8 days ago

      If you think about it for even a minute this is still a glaring cve in systemd, exposed in this case, by misbehaving snapd. systemd still needed to be patched and so did snapd.

  • corsicanguppy@lemmy.ca
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    4
    ·
    8 days ago

    “Systemd is built badly by weaponized dunning-kruger” – pros

    exploit [happens]

    World: surprised pikachu