diff --git a/2020/27xxx/CVE-2020-27352.json b/2020/27xxx/CVE-2020-27352.json index 018ec44347e..f5ffaf16b77 100644 --- a/2020/27xxx/CVE-2020-27352.json +++ b/2020/27xxx/CVE-2020-27352.json @@ -1,17 +1,101 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27352", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@ubuntu.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "When generating the systemd service units for the docker snap (and other similar snaps), snapd does not specify Delegate=yes - as a result systemd will move processes from the containers created and managed by these snaps into the cgroup of the main daemon within the snap itself when reloading system units. This may grant additional privileges to a container within the snap that were not originally intended." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Canonical Ltd.", + "product": { + "product_data": [ + { + "product_name": "snapd", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "2.48.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://bugs.launchpad.net/snapd/+bug/1910456", + "refsource": "MISC", + "name": "https://bugs.launchpad.net/snapd/+bug/1910456" + }, + { + "url": "https://ubuntu.com/security/notices/USN-4728-1", + "refsource": "MISC", + "name": "https://ubuntu.com/security/notices/USN-4728-1" + }, + { + "url": "https://www.cve.org/CVERecord?id=CVE-2020-27352", + "refsource": "MISC", + "name": "https://www.cve.org/CVERecord?id=CVE-2020-27352" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Gilad Reti" + }, + { + "lang": "en", + "value": "Nimrod Stoler" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" } ] } diff --git a/2024/6xxx/CVE-2024-6256.json b/2024/6xxx/CVE-2024-6256.json new file mode 100644 index 00000000000..063f5b08faa --- /dev/null +++ b/2024/6xxx/CVE-2024-6256.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6256", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6257.json b/2024/6xxx/CVE-2024-6257.json new file mode 100644 index 00000000000..daccbd8f6d5 --- /dev/null +++ b/2024/6xxx/CVE-2024-6257.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6257", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6258.json b/2024/6xxx/CVE-2024-6258.json new file mode 100644 index 00000000000..ac28a2a9430 --- /dev/null +++ b/2024/6xxx/CVE-2024-6258.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6258", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/6xxx/CVE-2024-6259.json b/2024/6xxx/CVE-2024-6259.json new file mode 100644 index 00000000000..ae242d415b8 --- /dev/null +++ b/2024/6xxx/CVE-2024-6259.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-6259", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file