Search for packages
| purl | pkg:deb/debian/audacity@1.3.12-6 |
| Next non-vulnerable version | 2.4.2~dfsg0-5 |
| Latest non-vulnerable version | 2.4.2~dfsg0-5 |
| Risk | 1.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-4e8r-fvv6-f7f2
Aliases: CVE-2016-2541 |
Audacity before 2.1.2 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted MP2 file. |
Affected by 1 other vulnerability. |
|
VCID-nxc6-nv2g-17g6
Aliases: CVE-2016-2540 |
Audacity before 2.1.2 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted FORMATCHUNK structure. |
Affected by 1 other vulnerability. |
|
VCID-veb9-7659-wfg7
Aliases: CVE-2020-11867 |
Audacity through 2.3.3 saves temporary files to /var/tmp/audacity-$USER by default. After Audacity creates the temporary directory, it sets its permissions to 755. Any user on the system can read and play the temporary audio .au files located there. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-c1k4-7mhy-73gp | A boundary error in Audacity allows for the execution of arbitrary code. |
CVE-2009-0490
|