-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-6170-1 [email protected] https://www.debian.org/security/ Salvatore Bonaccorso March 19, 2026 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : snapd CVE ID : CVE-2026-3888 Debian Bug : 1131120 The Qualys Threat Research Unit (TRU) discovered a local privilege escalation vulnerability in snapd, a daemon and tooling that enable snap packages. Details can be found in the Qualys advisory at https://cdn2.qualys.com/advisory/2026/03/17/snap-confine-systemd-tmpfiles.txt For the oldstable distribution (bookworm), this problem has been fixed in version 2.57.6-1+deb12u1. For the stable distribution (trixie), this problem has been fixed in version 2.68.3-3+deb13u1. We recommend that you upgrade your snapd packages. For the detailed security status of snapd please refer to its security tracker page at: https://security-tracker.debian.org/tracker/snapd Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: [email protected] -----BEGIN PGP SIGNATURE----- iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmm8eQdfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Tl5A/9GRu/4LmsVV5XH/6qLR6O+3ksn1gJQOZgrqwqfSQOdXeoVOnSfWlsEJxr FrX0k342ItWMEkDrrV/IErskQGXh5zBbvpWEEwqiKU3NMsXc/bJJ6QQW6VhYBOL+ 9mGo222OmwSnu4nfAdyFSAW0iWE9ZZCT3OSEHppTtGuT1zMd9wNUfv7PXypYhnss K/r9naplu6S8ATurAUED/r3uxeQ2gaxWabz1Ow36Ac+ZBk7+gmteQ0/CitVxUQ1b ezgmf9W1Rgbq37OTZj5ICQCmKtaPUtwL9cvUISMTMJcJ8EeQ97KpwIB9NM/5vH79 mwWjj+p3rzGVIiLtTk2AyF1Z0kF5xHIiJ+GGO9tt2tgU8QqgkSmLYD/uf+QF3nMr PHEfjOS7h2lO3kJInp+CyPR28v3ukTBIgakT0TZZqESURzPeqNbAeeCqFTWWdSUz lZobMRRWv0MTjBP747APEhOdKFAgbVVklm/PdTOeqtNqTPpyB4PdOPaXoJXbA5hw Nog80ARNhsn+XtfQ47Akid8ELXPYdxyFXH+/QCaO2696Cnc+WWOBHxGgVen5/l1d jTuMxEk+XwouNXr/TrQMdbCC/dbGRQJPmU9FvuAymzh+Lz/vnlloYWtZICI1crnn zEoc1yn3PV96ferShX6H8Zvjqk2WdWuYGXNhxJdhP+dVW7wxGE4= =uIFy -----END PGP SIGNATURE-----

