When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Aug 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Canonical
Canonical snapd Canonical ubuntu Linux |
|
CPEs | cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:* |
|
Vendors & Products |
Canonical
Canonical snapd Canonical ubuntu Linux |

Status: PUBLISHED
Assigner: canonical
Published: 2024-06-21T20:06:37.992Z
Updated: 2024-08-04T16:11:36.612Z
Reserved: 2020-10-20T00:00:00.000Z
Link: CVE-2020-27352

Updated: 2024-08-04T16:11:36.612Z

Status : Analyzed
Published: 2024-06-21T20:15:10.630
Modified: 2025-08-26T17:20:35.680
Link: CVE-2020-27352

No data.