When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended.
References
Link | Resource |
---|---|
https://bugs.launchpad.net/snapd/+bug/1910456 | Exploit Issue Tracking |
https://ubuntu.com/security/notices/USN-4728-1 | Vendor Advisory |
https://www.cve.org/CVERecord?id=CVE-2020-27352 | Third Party Advisory |
https://bugs.launchpad.net/snapd/+bug/1910456 | Exploit Issue Tracking |
https://ubuntu.com/security/notices/USN-4728-1 | Vendor Advisory |
https://www.cve.org/CVERecord?id=CVE-2020-27352 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
26 Aug 2025, 17:20
Type | Values Removed | Values Added |
---|---|---|
First Time |
Canonical snapd
Canonical Canonical ubuntu Linux |
|
References | () https://bugs.launchpad.net/snapd/+bug/1910456 - Exploit, Issue Tracking | |
References | () https://ubuntu.com/security/notices/USN-4728-1 - Vendor Advisory | |
References | () https://www.cve.org/CVERecord?id=CVE-2020-27352 - Third Party Advisory | |
CPE | cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* cpe:2.3:o:canonical:ubuntu_linux:20.10:*:*:*:*:*:*:* cpe:2.3:a:canonical:snapd:*:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* |
21 Nov 2024, 05:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.launchpad.net/snapd/+bug/1910456 - | |
References | () https://ubuntu.com/security/notices/USN-4728-1 - | |
References | () https://www.cve.org/CVERecord?id=CVE-2020-27352 - |
11 Jul 2024, 15:05
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-269 |
24 Jun 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
21 Jun 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-21 20:15
Updated : 2025-08-26 17:20
NVD link : CVE-2020-27352
Mitre link : CVE-2020-27352
CVE.ORG link : CVE-2020-27352
JSON object : View
Products Affected
canonical
- ubuntu_linux
- snapd
CWE
CWE-269
Improper Privilege Management