Bug 2215229 (CVE-2023-2976) - CVE-2023-2976 guava: insecure temporary directory creation
Summary: CVE-2023-2976 guava: insecure temporary directory creation
Keywords:
Status: NEW
Alias: CVE-2023-2976
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2215230 2215231 2232209 2232210 2215232
Blocks: 2215233
TreeView+ depends on / blocked
 
Reported: 2023-06-15 06:22 UTC by Sandipan Roy
Modified: 2023-08-17 18:07 UTC (History)
123 users (show)

Fixed In Version: guava 32.0.0
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Guava. The methodology for temporary directories and files can allow other local users or apps with accordant permissions to access the temp files, possibly leading to information exposure or tampering in the files created in the directory.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Sandipan Roy 2023-06-15 06:22:33 UTC
Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.

Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.



https://github.com/google/guava/issues/2575

Comment 12 Patrick Del Bello 2023-08-15 18:31:03 UTC
Created guava tracking bugs for this issue:

Affects: fedora-37 [bug 2232209]
Affects: fedora-38 [bug 2232210]


Note You need to log in before you can comment on or make changes to this bug.