<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" 
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:meneame="http://meneame.net/faq-es.php"
 >
<channel>
	<title>Menéame: comentarios [4158834]</title>
	<link>http://www.meneame.net</link>
	<image><title>www.meneame.net</title><link>http://www.meneame.net</link><url>http://cdn.mnmstatic.net/m/actualidad/img/mnm/eli-rss.png</url></image>
	<description>Sitio colaborativo de publicación y comunicación entre blogs</description>
	<pubDate>Thu, 19 Mar 2026 08:28:11 +0000</pubDate>
	<generator>http://blog.meneame.net/</generator>
	<language>es</language>
	<item>
		<meneame:comment_id>44543909</meneame:comment_id>
		<meneame:link_id>4158834</meneame:link_id>
		<meneame:order>11</meneame:order>
		<meneame:user>chavi</meneame:user>
		<meneame:votes>0</meneame:votes>
		<meneame:karma>12</meneame:karma>
		<meneame:url>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios</meneame:url>
		<title>#11 CVE-2026-3888: Importante fallo de Snap permite la escalada de privilegios locales a root [ENG]</title>
		<link>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c011#c-11</link>
		<pubDate>Thu, 19 Mar 2026 08:28:11 +0000</pubDate>
		<dc:creator>chavi</dc:creator>
		<guid>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c011#c-11</guid>
		<description><![CDATA[<p><a class="tooltip c:4158834-10" href="https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c010#c-10" rel="nofollow">#10</a> No tengo snap en mi sistema</p><p>&#187;&nbsp;autor: <strong>chavi</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>44543865</meneame:comment_id>
		<meneame:link_id>4158834</meneame:link_id>
		<meneame:order>10</meneame:order>
		<meneame:user>R2dC</meneame:user>
		<meneame:votes>0</meneame:votes>
		<meneame:karma>8</meneame:karma>
		<meneame:url>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios</meneame:url>
		<title>#10 CVE-2026-3888: Importante fallo de Snap permite la escalada de privilegios locales a root [ENG]</title>
		<link>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c010#c-10</link>
		<pubDate>Thu, 19 Mar 2026 08:20:08 +0000</pubDate>
		<dc:creator>R2dC</dc:creator>
		<guid>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c010#c-10</guid>
		<description><![CDATA[<p><a class="tooltip c:4158834-9" href="https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c09#c-9" rel="nofollow">#9</a> Tú échale un &#34;snap version&#34; no vaya a ser que te lleves una sorpresa <img data-src="https://cdn.mnmstatic.net/v_149/img/menemojis/36/lol.gif" alt="xD" title=":lol: xD" width="18" height="18" src="https://cdn.mnmstatic.net/v_149/img/g.gif" class="emoji lazy" /><br />
<br />
En Manjaro aún no han sacado parche.</p><p>&#187;&nbsp;autor: <strong>R2dC</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>44543807</meneame:comment_id>
		<meneame:link_id>4158834</meneame:link_id>
		<meneame:order>9</meneame:order>
		<meneame:user>chavi</meneame:user>
		<meneame:votes>0</meneame:votes>
		<meneame:karma>12</meneame:karma>
		<meneame:url>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios</meneame:url>
		<title>#9 CVE-2026-3888: Importante fallo de Snap permite la escalada de privilegios locales a root [ENG]</title>
		<link>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c09#c-9</link>
		<pubDate>Thu, 19 Mar 2026 08:08:09 +0000</pubDate>
		<dc:creator>chavi</dc:creator>
		<guid>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c09#c-9</guid>
		<description><![CDATA[<p><a class="tooltip c:4158834-5" href="https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c05#c-5" rel="nofollow">#5</a> Afecta a las versiones snap de esos programas en todo caso. En Debian no usan snap (si no quieres)</p><p>&#187;&nbsp;autor: <strong>chavi</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>44543794</meneame:comment_id>
		<meneame:link_id>4158834</meneame:link_id>
		<meneame:order>8</meneame:order>
		<meneame:user>chavi</meneame:user>
		<meneame:votes>0</meneame:votes>
		<meneame:karma>12</meneame:karma>
		<meneame:url>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios</meneame:url>
		<title>#8 CVE-2026-3888: Importante fallo de Snap permite la escalada de privilegios locales a root [ENG]</title>
		<link>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c08#c-8</link>
		<pubDate>Thu, 19 Mar 2026 08:06:37 +0000</pubDate>
		<dc:creator>chavi</dc:creator>
		<guid>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c08#c-8</guid>
		<description><![CDATA[<p><a class="tooltip c:4158834-2" href="https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c02#c-2" rel="nofollow">#2</a> Excelente solución</p><p>&#187;&nbsp;autor: <strong>chavi</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>44543590</meneame:comment_id>
		<meneame:link_id>4158834</meneame:link_id>
		<meneame:order>7</meneame:order>
		<meneame:user>reivaj01</meneame:user>
		<meneame:votes>2</meneame:votes>
		<meneame:karma>34</meneame:karma>
		<meneame:url>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios</meneame:url>
		<title>#7 CVE-2026-3888: Importante fallo de Snap permite la escalada de privilegios locales a root [ENG]</title>
		<link>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c07#c-7</link>
		<pubDate>Thu, 19 Mar 2026 07:28:45 +0000</pubDate>
		<dc:creator>reivaj01</dc:creator>
		<guid>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c07#c-7</guid>
		<description><![CDATA[<p><a class="tooltip c:4158834-6" href="https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c06#c-6" rel="nofollow">#6</a> Es que mi respuesta no deja de ser un comentario <img data-src="https://cdn.mnmstatic.net/v_149/img/menemojis/36/troll.png" alt=":troll:" title=":troll:" width="18" height="18" src="https://cdn.mnmstatic.net/v_149/img/g.gif" class="emoji lazy" /></p><p>&#187;&nbsp;autor: <strong>reivaj01</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>44543570</meneame:comment_id>
		<meneame:link_id>4158834</meneame:link_id>
		<meneame:order>6</meneame:order>
		<meneame:user>R2dC</meneame:user>
		<meneame:votes>0</meneame:votes>
		<meneame:karma>8</meneame:karma>
		<meneame:url>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios</meneame:url>
		<title>#6 CVE-2026-3888: Importante fallo de Snap permite la escalada de privilegios locales a root [ENG]</title>
		<link>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c06#c-6</link>
		<pubDate>Thu, 19 Mar 2026 07:25:18 +0000</pubDate>
		<dc:creator>R2dC</dc:creator>
		<guid>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c06#c-6</guid>
		<description><![CDATA[<p>Tu respuesta también está comentada  <a class="tooltip c:4158834-4" href="https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c04#c-4" rel="nofollow">#4</a> <img data-src="https://cdn.mnmstatic.net/v_149/img/menemojis/36/troll.png" alt=":troll:" title=":troll:" width="18" height="18" src="https://cdn.mnmstatic.net/v_149/img/g.gif" class="emoji lazy" /></p><p>&#187;&nbsp;autor: <strong>R2dC</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>44543562</meneame:comment_id>
		<meneame:link_id>4158834</meneame:link_id>
		<meneame:order>5</meneame:order>
		<meneame:user>R2dC</meneame:user>
		<meneame:votes>1</meneame:votes>
		<meneame:karma>20</meneame:karma>
		<meneame:url>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios</meneame:url>
		<title>#5 CVE-2026-3888: Importante fallo de Snap permite la escalada de privilegios locales a root [ENG]</title>
		<link>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c05#c-5</link>
		<pubDate>Thu, 19 Mar 2026 07:24:26 +0000</pubDate>
		<dc:creator>R2dC</dc:creator>
		<guid>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c05#c-5</guid>
		<description><![CDATA[<p><i>Snap is a package management system used in Ubuntu that allows users to install and manage applications in a self-contained format, known as snaps. The CVE-2026-3888 vulnerability involves a flaw in the snapd service, which manages these snaps, allowing local attackers to escalate their privileges to root access under certain conditions<br />
<br />
Snap is a universal package management system developed by Canonical for Linux distributions, primarily Ubuntu. Many applications across different categories use Snap for distribution and installation. Here are some common examples:</i><br />
<br />
Afecta a la ostia de programas (GIMP, VLC, Docker, OBS, Visual Studio, Blender, Telegram, Discord, Audacity, Chromium, Nginx, Spotify, Krita, Skype(???) ) , pero mayormente a ubuntu.<br />
<br />
Para otros SOs (con probar uno es suficiente):<br />
systemctl status snapd<br />
snap version<br />
dpkg -l | grep snapd (para Ubuntus y debians)<br />
rpm -qa | grep snapd (Fedoras/RHEL)<br />
snap list</p><p>&#187;&nbsp;autor: <strong>R2dC</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>44543331</meneame:comment_id>
		<meneame:link_id>4158834</meneame:link_id>
		<meneame:order>4</meneame:order>
		<meneame:user>reivaj01</meneame:user>
		<meneame:votes>2</meneame:votes>
		<meneame:karma>37</meneame:karma>
		<meneame:url>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios</meneame:url>
		<title>#4 CVE-2026-3888: Importante fallo de Snap permite la escalada de privilegios locales a root [ENG]</title>
		<link>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c04#c-4</link>
		<pubDate>Thu, 19 Mar 2026 06:17:56 +0000</pubDate>
		<dc:creator>reivaj01</dc:creator>
		<guid>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c04#c-4</guid>
		<description><![CDATA[<p><a class="tooltip c:4158834-2" href="https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c02#c-2" rel="nofollow">#2</a> Pero si tienes la línea comentada <img data-src="https://cdn.mnmstatic.net/v_149/img/menemojis/36/troll.png" alt=":troll:" title=":troll:" width="18" height="18" src="https://cdn.mnmstatic.net/v_149/img/g.gif" class="emoji lazy" /></p><p>&#187;&nbsp;autor: <strong>reivaj01</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>44543328</meneame:comment_id>
		<meneame:link_id>4158834</meneame:link_id>
		<meneame:order>3</meneame:order>
		<meneame:user>reivaj01</meneame:user>
		<meneame:votes>1</meneame:votes>
		<meneame:karma>26</meneame:karma>
		<meneame:url>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios</meneame:url>
		<title>#3 CVE-2026-3888: Importante fallo de Snap permite la escalada de privilegios locales a root [ENG]</title>
		<link>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c03#c-3</link>
		<pubDate>Thu, 19 Mar 2026 06:16:38 +0000</pubDate>
		<dc:creator>reivaj01</dc:creator>
		<guid>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c03#c-3</guid>
		<description><![CDATA[<p>Esto ha sido un duro golpe para la consolidación de 2026 como año de Linux en el escritorio.</p><p>&#187;&nbsp;autor: <strong>reivaj01</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>44543322</meneame:comment_id>
		<meneame:link_id>4158834</meneame:link_id>
		<meneame:order>2</meneame:order>
		<meneame:user>comadrejo</meneame:user>
		<meneame:votes>0</meneame:votes>
		<meneame:karma>11</meneame:karma>
		<meneame:url>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios</meneame:url>
		<title>#2 CVE-2026-3888: Importante fallo de Snap permite la escalada de privilegios locales a root [ENG]</title>
		<link>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c02#c-2</link>
		<pubDate>Thu, 19 Mar 2026 06:12:51 +0000</pubDate>
		<dc:creator>comadrejo</dc:creator>
		<guid>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c02#c-2</guid>
		<description><![CDATA[<p>Lo corrijo siempre en la postinstalación. <img data-src="https://cdn.mnmstatic.net/v_149/img/menemojis/36/troll.png" alt=":troll:" title=":troll:" width="18" height="18" src="https://cdn.mnmstatic.net/v_149/img/g.gif" class="emoji lazy" /> <br />
<br />
# apt autoremove --purge snapd</p><p>&#187;&nbsp;autor: <strong>comadrejo</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>44543282</meneame:comment_id>
		<meneame:link_id>4158834</meneame:link_id>
		<meneame:order>1</meneame:order>
		<meneame:user>Cehona</meneame:user>
		<meneame:votes>1</meneame:votes>
		<meneame:karma>27</meneame:karma>
		<meneame:url>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios</meneame:url>
		<title>#1 CVE-2026-3888: Importante fallo de Snap permite la escalada de privilegios locales a root [ENG]</title>
		<link>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c01#c-1</link>
		<pubDate>Thu, 19 Mar 2026 05:42:49 +0000</pubDate>
		<dc:creator>Cehona</dc:creator>
		<guid>https://www.meneame.net/m/actualidad/cve-2026-3888-importante-fallo-snap-permite-escalada-privilegios/c01#c-1</guid>
		<description><![CDATA[<p>La vulnerabilidad ya ha sido corregida. Cualquier persona que utilice un sistema afectado debe actualizarlo lo antes posible.<br />
<br />
Las versiones más relevantes son:<br />
<br />
Ubuntu 24.04: desde snapd 2.73+ubuntu24.04.2<br />
Ubuntu 25.10: desde snapd 2.73+ubuntu25.10.1<br />
Ubuntu 26.04 (desarrollo): desde snapd 2.74.1+ubuntu26.04.1<br />
Origen: desde snapd 2.75<br />
<br />
También puede ser conveniente actualizar las versiones LTS antiguas si se utiliza Snap con frecuencia.</p><p>&#187;&nbsp;autor: <strong>Cehona</strong></p>]]></description>
	</item>

</channel>
</rss>
