Bug 1179926 (CVE-2020-8908) - VUL-1: CVE-2020-8908: guava,guava20: A temp directory creation vulnerability exist in Guava versions prior to 30.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava com.
Summary: VUL-1: CVE-2020-8908: guava,guava20: A temp directory creation vulnerability ...
Status: RESOLVED FIXED
Alias: CVE-2020-8908
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P4 - Low : Minor
Target Milestone: ---
Assignee: Fridrich Strba
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/273158/
Whiteboard: CVSSv3.1:SUSE:CVE-2020-8908:4.0:(AV:L...
Keywords:
Depends on:
Blocks:
 
Reported: 2020-12-11 08:20 UTC by Johannes Segitz
Modified: 2024-04-08 12:31 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Johannes Segitz 2020-12-11 08:20:39 UTC
CVE-2020-8908

A temp directory creation vulnerability exist in Guava versions prior to 30.0
allowing an attacker with access to the machine to potentially access data in a
temporary directory created by the Guava
com.google.common.io.Files.createTempDir(). The permissions granted to the
directory created default to the standard unix-like /tmp ones, leaving the files
open.

The "fix" is to deprecate the function.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8908
https://github.com/google/guava/commit/fec0dbc4634006a6162cfd4d0d09c962073ddf40
https://github.com/google/guava/issues/4011
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8908
Comment 4 OBSbugzilla Bot 2021-05-11 10:20:03 UTC
This is an autogenerated message for OBS integration:
This bug (1179926) was mentioned in
https://build.opensuse.org/request/show/892204 Factory / guava
Comment 6 Petr Ostadal 2022-04-07 09:29:38 UTC
fixed
Comment 17 Maintenance Automation 2023-08-01 12:30:30 UTC
SUSE-SU-2023:3090-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1179926, 1212401
CVE References: CVE-2020-8908, CVE-2023-2976
Sources used:
openSUSE Leap 15.4 (src): guava-32.0.1-150200.3.7.1
openSUSE Leap 15.5 (src): guava-32.0.1-150200.3.7.1
Development Tools Module 15-SP4 (src): guava-32.0.1-150200.3.7.1
Development Tools Module 15-SP5 (src): guava-32.0.1-150200.3.7.1
SUSE Linux Enterprise Real Time 15 SP3 (src): guava-32.0.1-150200.3.7.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 18 Maintenance Automation 2024-02-27 11:10:08 UTC
SUSE-SU-2023:1831-1: An update that solves three vulnerabilities, contains one feature and has 22 security fixes can now be installed.

Category: security (important)
Bug References: 1179926, 1197027, 1206562, 1206973, 1207063, 1207308, 1207352, 1207490, 1207799, 1207829, 1207830, 1207838, 1207883, 1208288, 1208321, 1208325, 1208586, 1208687, 1208719, 1208772, 1208908, 1209369, 1209386, 1209434, 1209703
CVE References: CVE-2020-8908, CVE-2022-0860, CVE-2023-22644
Jira References: PED-2777
Sources used:
SUSE Manager Proxy 4.2 Module 4.2 (src): spacewalk-client-tools-4.2.23-150300.4.33.7, uyuni-common-libs-4.2.10-150300.3.17.6, spacecmd-4.2.22-150300.4.36.7, mgr-daemon-4.2.11-150300.2.12.5, susemanager-build-keys-15.3.6-150300.3.9.5, spacewalk-proxy-4.2.14-150300.3.27.6, spacewalk-web-4.2.34-150300.3.41.5, spacewalk-backend-4.2.27-150300.4.38.7
SUSE Manager Server 4.2 Module 4.2 (src): guava-30.1.1-150300.4.3.4, virtual-host-gatherer-1.0.25-150300.3.12.5, uyuni-common-libs-4.2.10-150300.3.17.6, spacecmd-4.2.22-150300.4.36.7, spacewalk-java-4.2.49-150300.3.63.3, susemanager-sls-4.2.32-150300.3.46.5, susemanager-build-keys-15.3.6-150300.3.9.5, susemanager-doc-indexes-4.2-150300.12.42.6, subscription-matcher-0.29-150300.6.15.5, susemanager-tftpsync-4.2.4-150300.3.6.6, spacewalk-web-4.2.34-150300.3.41.5, spacewalk-backend-4.2.27-150300.4.38.7, spacewalk-search-4.2.10-150300.3.18.6, jsr-305-3.0.2-150200.3.7.5, spacewalk-client-tools-4.2.23-150300.4.33.7, mgr-libmod-4.2.8-150300.3.9.6, susemanager-docs_en-4.2-150300.12.42.5, supportutils-plugin-susemanager-4.2.6-150300.3.12.5, cobbler-3.1.2-150300.5.22.5
openSUSE Leap 15.4 (src): jsr-305-3.0.2-150200.3.7.5
Development Tools Module 15-SP4 (src): jsr-305-3.0.2-150200.3.7.5
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): jsr-305-3.0.2-150200.3.7.5
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): jsr-305-3.0.2-150200.3.7.5
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): jsr-305-3.0.2-150200.3.7.5
SUSE Linux Enterprise Real Time 15 SP3 (src): jsr-305-3.0.2-150200.3.7.5
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): jsr-305-3.0.2-150200.3.7.5
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): jsr-305-3.0.2-150200.3.7.5
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): jsr-305-3.0.2-150200.3.7.5
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): jsr-305-3.0.2-150200.3.7.5
SUSE Enterprise Storage 7.1 (src): jsr-305-3.0.2-150200.3.7.5
SUSE Enterprise Storage 7 (src): jsr-305-3.0.2-150200.3.7.5

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 19 Maintenance Automation 2024-04-08 12:31:00 UTC
SUSE-SU-2024:1138-1: An update that solves two vulnerabilities can now be installed.

Category: security (moderate)
Bug References: 1179926, 1212401
CVE References: CVE-2020-8908, CVE-2023-2976
Maintenance Incident: [SUSE:Maintenance:32881](https://smelt.suse.de/incident/32881/)
Sources used:
SUSE Manager Server 4.3 Module 4.3 (src):
 guava-32.0.1-150400.3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.