Bypass of snapd pulseaudio restrictions
CVE-2020-16123

4.4MEDIUM

Key Information:

Vendor
Canonical
Vendor
CVE Published:
4 December 2020

Summary

An Ubuntu-specific patch in PulseAudio created a race condition where the snap policy module would fail to identify a client connection from a snap as coming from a snap if SCM_CREDENTIALS were missing, allowing the snap to connect to PulseAudio without proper confinement. This could be exploited by an attacker to expose sensitive information. Fixed in 1:13.99.3-1ubuntu2, 1:13.99.2-1ubuntu2.1, 1:13.99.1-1ubuntu3.8, 1:11.1-1ubuntu7.11, and 1:8.0-0ubuntu3.15.

Affected Version(s)

pulseaudio 1:13.99.3-1 < 1:13.99.3-1ubuntu2

pulseaudio 1:13.99.2-1 < 1:13.99.2-1ubuntu2.1

pulseaudio 1:13.99.1-1 < 1:13.99.1-1ubuntu3.8

References

CVSS V3.1

Score:
4.4
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

James Henstridge
.