pulseaudio CVE Vulnerabilities & Metrics

Focus on pulseaudio vulnerabilities and metrics.

Last updated: 10 Sep 2025, 22:25 UTC

About pulseaudio Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with pulseaudio. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total pulseaudio CVEs: 2
Earliest CVE date: 02 Apr 2007, 23:19 UTC
Latest CVE date: 23 Nov 2024, 03:15 UTC

Latest CVE reference: CVE-2024-11586

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical pulseaudio CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.87

Max CVSS: 7.8

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 3
4.0-6.9 1
7.0-8.9 3
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS pulseaudio CVEs

These are the five CVEs with the highest CVSS scores for pulseaudio, sorted by severity first and recency.

All CVEs for pulseaudio

CVE-2024-11586 pulseaudio vulnerability CVSS: 0 23 Nov 2024, 03:15 UTC

Ubuntu's implementation of pulseaudio can be crashed by a malicious program if a bluetooth headset is connected.

CVE-2020-11931 pulseaudio vulnerability CVSS: 2.1 15 May 2020, 04:15 UTC

An Ubuntu-specific modification to Pulseaudio to provide security mediation for Snap-packaged applications was found to have a bypass of intended access restriction for snaps which plugs any of pulseaudio, audio-playback or audio-record via unloading the pulseaudio snap policy module. This issue affects: pulseaudio 1:8.0 versions prior to 1:8.0-0ubuntu3.12; 1:11.1 versions prior to 1:11.1-1ubuntu7.7; 1:13.0 versions prior to 1:13.0-1ubuntu1.2; 1:13.99.1 versions prior to 1:13.99.1-1ubuntu3.2;

CVE-2014-3970 pulseaudio vulnerability CVSS: 2.9 11 Jun 2014, 14:55 UTC

The pa_rtp_recv function in modules/rtp/rtp.c in the module-rtp-recv module in PulseAudio 5.0 and earlier allows remote attackers to cause a denial of service (assertion failure and abort) via an empty UDP packet.

CVE-2009-1299 pulseaudio vulnerability CVSS: 6.9 18 Mar 2010, 17:30 UTC

The pa_make_secure_dir function in core-util.c in PulseAudio 0.9.10 and 0.9.19 allows local users to change the ownership and permissions of arbitrary files via a symlink attack on a /tmp/.esd-##### temporary file.

CVE-2009-1894 pulseaudio vulnerability CVSS: 7.2 17 Jul 2009, 16:30 UTC

Race condition in PulseAudio 0.9.9, 0.9.10, and 0.9.14 allows local users to gain privileges via vectors involving creation of a hard link, related to the application setting LD_BIND_NOW to 1, and then calling execv on the target of the /proc/self/exe symlink.

CVE-2008-0008 pulseaudio vulnerability CVSS: 7.2 29 Jan 2008, 00:00 UTC

The pa_drop_root function in PulseAudio 0.9.8, and a certain 0.9.9 build, does not check return values from (1) setresuid, (2) setreuid, (3) setuid, and (4) seteuid calls when attempting to drop privileges, which might allow local users to gain privileges by causing those calls to fail via attacks such as resource exhaustion.

CVE-2007-1804 pulseaudio vulnerability CVSS: 7.8 02 Apr 2007, 23:19 UTC

PulseAudio 0.9.5 allows remote attackers to cause a denial of service (daemon crash) via (1) a PA_PSTREAM_DESCRIPTOR_LENGTH value of FRAME_SIZE_MAX_ALLOW sent on TCP port 9875, which triggers a p->export assertion failure in do_read; (2) a PA_PSTREAM_DESCRIPTOR_LENGTH value of 0 sent on TCP port 9875, which triggers a length assertion failure in pa_memblock_new; or (3) an empty packet on UDP port 9875, which triggers a t assertion failure in pa_sdp_parse; and allows remote authenticated users to cause a denial of service (daemon crash) via a crafted packet on TCP port 9875 that (4) triggers a maxlength assertion failure in pa_memblockq_new, (5) triggers a size assertion failure in pa_xmalloc, or (6) plays a certain sound file.