Description
When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-19864 | When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended. |
Ubuntu USN |
USN-4728-1 | snapd vulnerability |
References
History
Tue, 26 Aug 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Canonical
Canonical snapd Canonical ubuntu Linux |
|
| CPEs | cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:* |
|
| Vendors & Products |
Canonical
Canonical snapd Canonical ubuntu Linux |
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-08-04T16:11:36.612Z
Reserved: 2020-10-20T00:00:00.000Z
Link: CVE-2020-27352
Updated: 2024-08-04T16:11:36.612Z
Status : Analyzed
Published: 2024-06-21T20:15:10.630
Modified: 2025-08-26T17:20:35.680
Link: CVE-2020-27352
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN