THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2020-27352

Assignercanonical
Reserved2020-10-20
Published2024-06-21
Updated2024-07-09

Description

When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.



CRITICAL: 9.3CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Product status

Any version before 2.48.3
affected

Credits

Gilad Reti finder

Nimrod Stoler finder

References

https://bugs.launchpad.net/snapd/+bug/1910456 issue-tracking

https://ubuntu.com/security/notices/USN-4728-1 vendor-advisory

https://www.cve.org/CVERecord?id=CVE-2020-27352 issue-tracking

cve.org CVE-2020-27352

nvd.nist.gov CVE-2020-27352

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2020-27352
© Copyright 2024 THREATINT. Made in Cyprus with +