This bug was fixed in the package pulseaudio - 1:13.99.2-1ubuntu2.1 --------------- pulseaudio (1:13.99.2-1ubuntu2.1) groovy-security; urgency=medium
* SECURITY UPDATE: don't rely on SCM_CREDENTIALS to detect snap confined clients (LP: #1895928) - d/p/0409-pa-client-peer-credentials.patch: drop patch - d/p/0409-fix-arg-parsing-after-async-hook.patch: remains of old 0409 patch not related to pa_creds. - d/p/0410-pa-client-peer-apparmor-label.patch: new patch, records AppArmor label in pa_client struct for native connections using aa_getpeercon. - d/p/0702-add-snappy-policy-module.patch: use the AppArmor label in the pa_client rather than looking it up via the process ID from SCM_CREDENTIALS. - CVE-2020-16123 * Don't block classic snaps from module loading/unloading (LP: #1886854) - d/p/0702-add-snappy-policy-module.patch: replace deny_to_snaps_hook with a version that allows classic snaps. -- James Henstridge <james.henstri...@canonical.com> Thu, 05 Nov 2020 16:46:59 -0500 ** Changed in: pulseaudio (Ubuntu) Status: New => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-16123 ** Changed in: pulseaudio (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1886854 Title: Race in load-module snap policy check in classic confinement To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/1886854/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs