{"id":"CVE-2013-2035","details":"Race condition in hawtjni-runtime/src/main/java/org/fusesource/hawtjni/runtime/Library.java in HawtJNI before 1.8, when a custom library path is not specified, allows local users to execute arbitrary Java code by overwriting a temporary JAR file with a predictable name in /tmp.","aliases":["GHSA-49j7-qghp-5wj8"],"modified":"2026-04-16T01:47:30.606541291Z","published":"2013-08-28T23:55:04Z","withdrawn":"2026-01-27T04:13:09.398266Z","references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2013-1029.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2013-1784.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2013-1785.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2013-1786.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-0029.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-0245.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-0254.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2014-0400.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2015-0034.html"},{"type":"ADVISORY","url":"http://secunia.com/advisories/53415"},{"type":"ADVISORY","url":"http://secunia.com/advisories/54108"},{"type":"ADVISORY","url":"http://secunia.com/advisories/57915"},{"type":"FIX","url":"https://github.com/fusesource/hawtjni/commit/92c266170ce98edc200c656bd034a237098b8aa5"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2035"},{"type":"REPORT","url":"https://github.com/jline/jline2/issues/85"},{"type":"REPORT","url":"https://github.com/jruby/jruby/issues/732"},{"type":"WEB","url":"http://www.osvdb.org/93411"},{"type":"WEB","url":"http://www.securitytracker.com/id/1029431"}],"schema_version":"1.7.3"}