When curl saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name. In that rename operation, it might accidentally *widen* the permissions for the target file, leaving the updated file accessible to more users than intended.
Created curl tracking bugs for this issue: Affects: fedora-all [bug 2101652] Created mingw-curl tracking bugs for this issue: Affects: fedora-all [bug 2101653]
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:6157 https://access.redhat.com/errata/RHSA-2022:6157
This issue has been addressed in the following products: JBoss Core Services on RHEL 7 JBoss Core Services for RHEL 8 Via RHSA-2022:8840 https://access.redhat.com/errata/RHSA-2022:8840
This issue has been addressed in the following products: Red Hat JBoss Core Services Via RHSA-2022:8841 https://access.redhat.com/errata/RHSA-2022:8841
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-32207