Bypass of snapd pulseaudio restrictions
CVE-2020-16123
4.4MEDIUM
Summary
An Ubuntu-specific patch in PulseAudio created a race condition where the snap policy module would fail to identify a client connection from a snap as coming from a snap if SCM_CREDENTIALS were missing, allowing the snap to connect to PulseAudio without proper confinement. This could be exploited by an attacker to expose sensitive information. Fixed in 1:13.99.3-1ubuntu2, 1:13.99.2-1ubuntu2.1, 1:13.99.1-1ubuntu3.8, 1:11.1-1ubuntu7.11, and 1:8.0-0ubuntu3.15.
Affected Version(s)
pulseaudio 1:13.99.3-1 < 1:13.99.3-1ubuntu2
pulseaudio 1:13.99.2-1 < 1:13.99.2-1ubuntu2.1
pulseaudio 1:13.99.1-1 < 1:13.99.1-1ubuntu3.8
References
CVSS V3.1
Score:
4.4
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
James Henstridge