{"id":36733,"date":"2020-05-13T04:25:07","date_gmt":"2020-05-12T19:25:07","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-4355-1-pulseaudio-vulnerability\/"},"modified":"2020-05-13T05:34:08","modified_gmt":"2020-05-12T20:34:08","slug":"usn-4355-1-pulseaudio-vulnerability","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-4355-1-pulseaudio-vulnerability\/","title":{"rendered":"USN-4355-1: PulseAudio vulnerability"},"content":{"rendered":"<p>USN-4355-1: PulseAudio vulnerability<\/p>\n<h2 id=\"pulseaudio-vulnerability\">pulseaudio vulnerability<\/h2>\n<p>A security issue affects these releases of Ubuntu and its derivatives:<\/p>\n<ul>\n<li>Ubuntu 20.04 LTS<\/li>\n<li>Ubuntu 19.10<\/li>\n<li>Ubuntu 18.04 LTS<\/li>\n<li>Ubuntu 16.04 LTS<\/li>\n<\/ul>\n<h3 id=\"summary\">Summary<\/h3>\n<p>PulseAudio could allow unintended access to snap packages.<\/p>\n<h3 id=\"software-description\">Software Description<\/h3>\n<ul>\n<li>pulseaudio &#8211; PulseAudio sound server<\/li>\n<\/ul>\n<h3 id=\"details\">Details<\/h3>\n<p>PulseAudio in Ubuntu contains additional functionality to mediate audio<br \/>\nrecording for snap packages and it was discovered that this functionality<br \/>\ndid not mediate PulseAudio module unloading. An attacker-controlled snap<br \/>\nwith only the audio-playback interface connected could exploit this to<br \/>\nbypass access controls and record audio.<\/p>\n<h2 id=\"update-instructions\">Update instructions<\/h2>\n<p>The problem can be corrected by updating your system to the following package versions:<\/p>\n<dl>\n<dt>Ubuntu 20.04 LTS<\/dt>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/pulseaudio\">pulseaudio<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/pulseaudio\/1:13.99.1-1ubuntu3.2\">1:13.99.1-1ubuntu3.2<\/a><\/dd>\n<dt>Ubuntu 19.10<\/dt>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/pulseaudio\">pulseaudio<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/pulseaudio\/1:13.0-1ubuntu1.2\">1:13.0-1ubuntu1.2<\/a><\/dd>\n<dt>Ubuntu 18.04 LTS<\/dt>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/pulseaudio\">pulseaudio<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/pulseaudio\/1:11.1-1ubuntu7.7\">1:11.1-1ubuntu7.7<\/a><\/dd>\n<dt>Ubuntu 16.04 LTS<\/dt>\n<dd><a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/pulseaudio\">pulseaudio<\/a> &#8211; <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/pulseaudio\/1:8.0-0ubuntu3.12\">1:8.0-0ubuntu3.12<\/a><\/dd>\n<\/dl>\n<p>To update your system, please follow these instructions: <a href=\"https:\/\/wiki.ubuntu.com\/Security\/Upgrades\">https:\/\/wiki.ubuntu.com\/Security\/Upgrades<\/a>.<\/p>\n<p>After a standard system update you need to restart your session to make<br \/>\nall the necessary changes.<\/p>\n<h2 id=\"references\">References<\/h2>\n<ul>\n<li><a href=\"https:\/\/people.canonical.com\/~ubuntu-security\/cve\/CVE-2020-11931\">CVE-2020-11931<\/a><\/li>\n<li><a href=\"https:\/\/launchpad.net\/bugs\/1877102\">LP: 1877102<\/a><\/li>\n<\/ul>\n<p>Source: <a href=\"https:\/\/usn.ubuntu.com\/4355-1\/\" target=\"_blank\" rel=\"noopener noreferrer\">USN-4355-1: PulseAudio vulnerability<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-4355-1: PulseAudio vulnerability pulseaudio vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 20.04 LTS Ubuntu 19.10 Ubuntu 18.04 LTS Ubuntu 16.04 LTS Summary PulseAudio could allow unintended access to snap packages. Software Description pulseaudio &#8211; PulseAudio sound server Details PulseAudio in Ubuntu contains additional functionality to mediate audio recording for snap packages and it was discovered that this functionality did not mediate PulseAudio module unloading. An attacker-controlled snap with only the audio-playback interface connected could exploit this to bypass access controls and record audio. Update instructions The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS pulseaudio &#8211; 1:13.99.1-1ubuntu3.2 Ubuntu 19.10 pulseaudio &#8211; 1:13.0-1ubuntu1.2 Ubuntu 18.04 LTS pulseaudio &#8211; 1:11.1-1ubuntu7.7 Ubuntu 16.04 LTS pulseaudio &#8211; 1:8.0-0ubuntu3.12 To update your system, please follow these instructions: https:\/\/wiki.ubuntu.com\/Security\/Upgrades. After a standard <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-4355-1-pulseaudio-vulnerability\/\" title=\"USN-4355-1: PulseAudio vulnerability\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-36733","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/36733","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=36733"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/36733\/revisions"}],"predecessor-version":[{"id":36734,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/36733\/revisions\/36734"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=36733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=36733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=36733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}