CVE-2020-27352

When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.
Configurations

No configuration.

History

21 Nov 2024, 05:21

Type Values Removed Values Added
References () https://bugs.launchpad.net/snapd/+bug/1910456 - () https://bugs.launchpad.net/snapd/+bug/1910456 -
References () https://ubuntu.com/security/notices/USN-4728-1 - () https://ubuntu.com/security/notices/USN-4728-1 -
References () https://www.cve.org/CVERecord?id=CVE-2020-27352 - () https://www.cve.org/CVERecord?id=CVE-2020-27352 -

11 Jul 2024, 15:05

Type Values Removed Values Added
CWE CWE-269

24 Jun 2024, 12:57

Type Values Removed Values Added
Summary
  • (es) Al generar las unidades de servicio systemd para el complemento de Docker (y otros complementos similares), snapd no especifica Delegate=yes; como resultado, systemd moverá los procesos de los contenedores creados y administrados por estos complementos al grupo c del daemon principal dentro del se rompe al recargar las unidades del sistema. Esto puede otorgar privilegios adicionales a un contenedor dentro del complemento que no estaban previstos originalmente.

21 Jun 2024, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-21 20:15

Updated : 2024-11-21 05:21


NVD link : CVE-2020-27352

Mitre link : CVE-2020-27352

CVE.ORG link : CVE-2020-27352


JSON object : View

Products Affected

No product.

CWE
CWE-269

Improper Privilege Management