<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2023-0248</id>
    <title>An update for guava is now available for HCE 2.0</title>
    <severity>Important</severity>
    <release>HCE 2.0</release>
    <issued date="2023-08-29 13:10:18"/>
    <updated date="2023-08-29 13:10:18"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2023-2976" id="CVE-2023-2976" title="CVE-2023-2976 Base Score: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" type="cve"/>
    </references>
    <description>Security Fix(es):

Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.

Even though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.

 (CVE-2023-2976)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="guava">
        <name>HCE 2.0</name>
        <package arch="noarch" name="guava" version="25.0" release="6.hce2">
          <filename>guava-25.0-6.hce2.noarch.rpm</filename>
        </package>
        <package arch="noarch" name="guava-help" version="25.0" release="6.hce2">
          <filename>guava-help-25.0-6.hce2.noarch.rpm</filename>
        </package>
        <package arch="noarch" name="guava-testlib" version="25.0" release="6.hce2">
          <filename>guava-testlib-25.0-6.hce2.noarch.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
