Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-11867

Опубликовано: 30 нояб. 2020
Источник: ubuntu
Приоритет: medium
CVSS2: 2.1
CVSS3: 3.3

Описание

Audacity through 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

3.7.1+dfsg-1
esm-apps/bionic

released

2.2.1-1ubuntu0.1~esm1
esm-apps/focal

released

2.3.3-1ubuntu0.1~esm1
esm-apps/jammy

not-affected

2.4.2~dfsg0-5
esm-apps/noble

not-affected

3.4.2+dfsg-1build4
esm-apps/xenial

released

2.1.2-1ubuntu0.1~esm1
esm-infra-legacy/trusty

DNE

focal

ignored

end of standard support, was needed
groovy

ignored

end of life

Показывать по

2.1 Low

CVSS2

3.3 Low

CVSS3

Связанные уязвимости

CVSS3: 3.3
nvd
около 5 лет назад

Audacity through 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there.

CVSS3: 3.3
debian
около 5 лет назад

Audacity through 2.3.3 saves temporary files to /var/tmp/audacity-$USE ...

suse-cvrf
около 5 лет назад

Security update for audacity

github
больше 3 лет назад

Audacity through 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there.

CVSS3: 3.3
fstec
около 5 лет назад

Уязвимость компонента AudacityApp.cpp аудиоредактора звуковых файлов Audacity, связанная с настройками прав доступа по умолчанию, позволяющая нарушителю получить доступ к конфиденциальным данным

2.1 Low

CVSS2

3.3 Low

CVSS3