CVE-2020-27352

When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.3 CRITICAL
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
canonicalCNA
9.3 CRITICAL
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CISA-ADPADP
---
---
CVEADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 12%
Debian logo
Debian Releases
Debian Product
Codename
snapd
bullseye (security)
2.49-1+deb11u2
fixed
bullseye
2.49-1+deb11u2
fixed
buster
no-dsa
stretch
no-dsa
bookworm
2.57.6-1
fixed
sid
2.65.3-1
fixed
trixie
2.65.3-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
snapd
groovy
Fixed 2.48.3+20.10
released
focal
Fixed 2.48.3+20.04
released
bionic
Fixed 2.48.3+18.04
released
xenial
Fixed 2.48.3
released
trusty
dne