First published: Mon Nov 30 2020(Updated: )
Audacity through 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/audacity | 2.4.2~dfsg0-5 3.2.4+dfsg-1 3.7.1+dfsg-1 | |
Audacity | <=2.3.3 | |
Fedora | =33 | |
Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11867 has been classified as a medium severity vulnerability due to the improper permission settings allowing unauthorized access to temporary audio files.
To fix CVE-2020-11867, update Audacity to version 2.4.2 or later, where this vulnerability has been addressed.
Audacity versions up to and including 2.3.3 are affected by CVE-2020-11867.
The CVE-2020-11867 vulnerability exposes temporary audio .au files to any user on the system.
Yes, CVE-2020-11867 can potentially lead to data leakage as any user can read and play the temporary audio files created by Audacity.