When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.
History

Tue, 26 Aug 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Canonical
Canonical snapd
Canonical ubuntu Linux
CPEs cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:*
Vendors & Products Canonical
Canonical snapd
Canonical ubuntu Linux

cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published: 2024-06-21T20:06:37.992Z

Updated: 2024-08-04T16:11:36.612Z

Reserved: 2020-10-20T00:00:00.000Z

Link: CVE-2020-27352

cve-icon Vulnrichment

Updated: 2024-08-04T16:11:36.612Z

cve-icon NVD

Status : Analyzed

Published: 2024-06-21T20:15:10.630

Modified: 2025-08-26T17:20:35.680

Link: CVE-2020-27352

cve-icon Redhat

No data.