Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-27352

Опубликовано: 21 июн. 2024
Источник: ubuntu
Приоритет: high
CVSS3: 9.3

Описание

When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.

РелизСтатусПримечание
bionic

released

2.48.3+18.04
devel

released

2.49+21.04build1
esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

2.48.3+18.04
esm-infra/focal

released

2.48.3+20.04
esm-infra/xenial

released

2.48.3
focal

released

2.48.3+20.04
groovy

released

2.48.3+20.10
precise/esm

DNE

snap

released

2.48.2.1

Показывать по

9.3 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.3
nvd
больше 1 года назад

When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.

CVSS3: 9.3
debian
больше 1 года назад

When generating the systemd service units for the docker snap (and oth ...

CVSS3: 9.3
github
больше 1 года назад

When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.

9.3 Critical

CVSS3