USN-4519-1: PulseAudio vulnerability
Publication date
17 September 2020
Overview
PulseAudio could be made to crash or run programs as your login if it received specially crafted input.
Releases
Packages
- pulseaudio - PulseAudio sound server
Details
Ratchanan Srirattanamet discovered that an Ubuntu-specific patch caused
PulseAudio to incorrectly handle memory under certain error conditions in the
Bluez 5 module. An attacker could use this issue to cause PulseAudio to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2020-15710)
Ratchanan Srirattanamet discovered that an Ubuntu-specific patch caused
PulseAudio to incorrectly handle memory under certain error conditions in the
Bluez 5 module. An attacker could use this issue to cause PulseAudio to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2020-15710)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
16.04 xenial | libpulse-mainloop-glib0 – 1:8.0-0ubuntu3.14 | ||
libpulse0 – 1:8.0-0ubuntu3.14 | |||
pulseaudio – 1:8.0-0ubuntu3.14 | |||
pulseaudio-module-bluetooth – 1:8.0-0ubuntu3.14 | |||
pulseaudio-utils – 1:8.0-0ubuntu3.14 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.