Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-27352

Опубликовано: 21 июн. 2024
Источник: debian

Описание

When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
snapdfixed2.49-1package
snapdno-dsabusterpackage
snapdno-dsastretchpackage

Примечания

  • https://ubuntu.com/security/notices/USN-4728-1

  • https://github.com/docker-snap/docker-snap/security/advisories/GHSA-798c-v3jq-h646

  • https://bugs.launchpad.net/snapd/+bug/1910456

Связанные уязвимости

CVSS3: 9.3
ubuntu
больше 1 года назад

When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.

CVSS3: 9.3
nvd
больше 1 года назад

When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.

CVSS3: 9.3
github
больше 1 года назад

When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.