Pulseaudio

Pulseaudio

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 23.11.2024 03:15:07
  • Zuletzt bearbeitet 26.08.2025 17:22:18

Ubuntu's implementation of pulseaudio can be crashed by a malicious program if a bluetooth headset is connected.

  • EPSS 0.04%
  • Veröffentlicht 15.05.2020 04:15:10
  • Zuletzt bearbeitet 21.11.2024 04:58:55

An Ubuntu-specific modification to Pulseaudio to provide security mediation for Snap-packaged applications was found to have a bypass of intended access restriction for snaps which plugs any of pulseaudio, audio-playback or audio-record via unloading...

Exploit
  • EPSS 0.47%
  • Veröffentlicht 11.06.2014 14:55:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The pa_rtp_recv function in modules/rtp/rtp.c in the module-rtp-recv module in PulseAudio 5.0 and earlier allows remote attackers to cause a denial of service (assertion failure and abort) via an empty UDP packet.

  • EPSS 0.02%
  • Veröffentlicht 18.03.2010 17:30:00
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The pa_make_secure_dir function in core-util.c in PulseAudio 0.9.10 and 0.9.19 allows local users to change the ownership and permissions of arbitrary files via a symlink attack on a /tmp/.esd-##### temporary file.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 17.07.2009 16:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Race condition in PulseAudio 0.9.9, 0.9.10, and 0.9.14 allows local users to gain privileges via vectors involving creation of a hard link, related to the application setting LD_BIND_NOW to 1, and then calling execv on the target of the /proc/self/ex...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 29.01.2008 00:00:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The pa_drop_root function in PulseAudio 0.9.8, and a certain 0.9.9 build, does not check return values from (1) setresuid, (2) setreuid, (3) setuid, and (4) seteuid calls when attempting to drop privileges, which might allow local users to gain privi...

  • EPSS 14.74%
  • Veröffentlicht 02.04.2007 23:19:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

PulseAudio 0.9.5 allows remote attackers to cause a denial of service (daemon crash) via (1) a PA_PSTREAM_DESCRIPTOR_LENGTH value of FRAME_SIZE_MAX_ALLOW sent on TCP port 9875, which triggers a p->export assertion failure in do_read; (2) a PA_PSTREAM...