{"id":"USN-4519-1","summary":"pulseaudio vulnerability","details":"Ratchanan Srirattanamet discovered that an Ubuntu-specific patch caused\nPulseAudio to incorrectly handle memory under certain error conditions in the\nBluez 5 module. An attacker could use this issue to cause PulseAudio to crash,\nresulting in a denial of service, or possibly execute arbitrary code.\n(CVE-2020-15710)\n","modified":"2026-02-10T04:41:55Z","published":"2020-09-17T22:08:14Z","related":["UBUNTU-CVE-2020-15710"],"upstream":["CVE-2020-15710","UBUNTU-CVE-2020-15710"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-4519-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2020-15710"}],"affected":[{"package":{"name":"pulseaudio","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/pulseaudio@1:8.0-0ubuntu3.14?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:8.0-0ubuntu3.14"}]}],"versions":["1:6.0-0ubuntu13","1:7.1-1ubuntu1","1:7.1-1ubuntu2","1:7.1-1ubuntu3","1:7.1-1ubuntu6","1:7.1-1ubuntu7","1:8.0-0ubuntu2","1:8.0-0ubuntu3","1:8.0-0ubuntu3.1","1:8.0-0ubuntu3.2","1:8.0-0ubuntu3.3","1:8.0-0ubuntu3.4","1:8.0-0ubuntu3.7","1:8.0-0ubuntu3.8","1:8.0-0ubuntu3.9","1:8.0-0ubuntu3.10","1:8.0-0ubuntu3.11","1:8.0-0ubuntu3.12"],"ecosystem_specific":{"binaries":[{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"libpulse-dev"},{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"libpulse-mainloop-glib0"},{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"libpulse0"},{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"libpulsedsp"},{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"pulseaudio"},{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"pulseaudio-esound-compat"},{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"pulseaudio-module-bluetooth"},{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"pulseaudio-module-droid"},{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"pulseaudio-module-gconf"},{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"pulseaudio-module-jack"},{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"pulseaudio-module-lirc"},{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"pulseaudio-module-raop"},{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"pulseaudio-module-trust-store"},{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"pulseaudio-module-x11"},{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"pulseaudio-module-zeroconf"},{"binary_version":"1:8.0-0ubuntu3.14","binary_name":"pulseaudio-utils"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:16.04:LTS","cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2020-15710"}]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-4519-1.json"}}],"schema_version":"1.7.3"}