Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-11867

Опубликовано: 30 нояб. 2020
Источник: debian

Описание

Audacity through 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
audacityfixed2.4.2~dfsg0-4package
audacityno-dsabusterpackage
audacityno-dsastretchpackage

Примечания

  • https://github.com/audacity/audacity/pull/700

Связанные уязвимости

CVSS3: 3.3
ubuntu
около 5 лет назад

Audacity through 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there.

CVSS3: 3.3
nvd
около 5 лет назад

Audacity through 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there.

suse-cvrf
около 5 лет назад

Security update for audacity

github
больше 3 лет назад

Audacity through 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there.

CVSS3: 3.3
fstec
около 5 лет назад

Уязвимость компонента AudacityApp.cpp аудиоредактора звуковых файлов Audacity, связанная с настройками прав доступа по умолчанию, позволяющая нарушителю получить доступ к конфиденциальным данным