Products
Docker Snap
Source
security@ubuntu.com
Tags
CVE-2020-27352 details
Published : June 21, 2024, 8:15 p.m.
Last Modified : June 21, 2024, 8:15 p.m.
Last Modified : June 21, 2024, 8:15 p.m.
Description
When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9.3 | 10 |
---|
Weakness
Weakness | Name | Description |
---|
CVSS Data
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
9.3
Exploitability Score
2.5
Impact Score
6.0
Base Severity
CRITICAL
Vector String : CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
References
URL | Source |
---|---|
https://bugs.launchpad.net/snapd/+bug/1910456 | security@ubuntu.com |
https://ubuntu.com/security/notices/USN-4728-1 | security@ubuntu.com |
https://www.cve.org/CVERecord?id=CVE-2020-27352 | security@ubuntu.com |
This website uses the NVD API, but is not approved or certified by it.