Rapid7 Vulnerability & Exploit Database

Ubuntu: USN-4640-1 (CVE-2020-16123): PulseAudio vulnerability

Back to Search

Ubuntu: USN-4640-1 (CVE-2020-16123): PulseAudio vulnerability

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
11/23/2020
Created
11/27/2020
Added
11/24/2020
Modified
03/09/2021

Description

An Ubuntu-specific patch in PulseAudio created a race condition where the snap policy module would fail to identify a client connection from a snap as coming from a snap if SCM_CREDENTIALS were missing, allowing the snap to connect to PulseAudio without proper confinement. This could be exploited by an attacker to expose sensitive information. Fixed in 1:13.99.3-1ubuntu2, 1:13.99.2-1ubuntu2.1, 1:13.99.1-1ubuntu3.8, 1:11.1-1ubuntu7.11, and 1:8.0-0ubuntu3.15.

Solution(s)

  • ubuntu-upgrade-libpulse-mainloop-glib0
  • ubuntu-upgrade-libpulse0
  • ubuntu-upgrade-libpulsedsp
  • ubuntu-upgrade-pulseaudio
  • ubuntu-upgrade-pulseaudio-equalizer
  • ubuntu-upgrade-pulseaudio-esound-compat
  • ubuntu-upgrade-pulseaudio-module-bluetooth
  • ubuntu-upgrade-pulseaudio-module-droid
  • ubuntu-upgrade-pulseaudio-module-gconf
  • ubuntu-upgrade-pulseaudio-module-gsettings
  • ubuntu-upgrade-pulseaudio-module-jack
  • ubuntu-upgrade-pulseaudio-module-lirc
  • ubuntu-upgrade-pulseaudio-module-raop
  • ubuntu-upgrade-pulseaudio-module-trust-store
  • ubuntu-upgrade-pulseaudio-module-x11
  • ubuntu-upgrade-pulseaudio-module-zeroconf
  • ubuntu-upgrade-pulseaudio-utils

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;