Description
Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class. Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.
Remediation
References
https://github.com/google/guava/issues/2575
https://security.netapp.com/advisory/ntap-20230818-0008/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01006.html
Related Vulnerabilities
CVE-2023-33544 Vulnerability in maven package io.hawt:hawtio-system
CVE-2013-2165 Vulnerability in maven package org.richfaces:richfaces
CVE-2023-48088 Vulnerability in maven package com.xuxueli:xxl-job-admin
CVE-2018-17785 Vulnerability in maven package cc.blynk.server.api.core:http-core
CVE-2021-22112 Vulnerability in maven package org.springframework.security:spring-security-core