CVE-2020-27352

When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.
Configurations

Configuration 1 (hide)

cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:*

History

26 Aug 2025, 17:20

Type Values Removed Values Added
References () https://bugs.launchpad.net/snapd/+bug/1910456 - () https://bugs.launchpad.net/snapd/+bug/1910456 - Exploit, Issue Tracking
References () https://ubuntu.com/security/notices/USN-4728-1 - () https://ubuntu.com/security/notices/USN-4728-1 - Vendor Advisory
References () https://www.cve.org/CVERecord?id=CVE-2020-27352 - () https://www.cve.org/CVERecord?id=CVE-2020-27352 - Third Party Advisory
CPE cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:*
First Time Canonical
Canonical snapd
Canonical ubuntu Linux

Information

Published : 2024-06-21 20:15

Updated : 2025-08-26 17:20


NVD link : CVE-2020-27352

Mitre link : CVE-2020-27352

CVE.ORG link : CVE-2020-27352


JSON object : View

Products Affected

canonical

  • snapd
  • ubuntu_linux
CWE
CWE-269

Improper Privilege Management