Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

🔐 CVE-2024-23454: org.apache.hadoop:hadoop-common:jar:3.3.6:compile #327

Open
github-actions bot opened this issue Sep 28, 2024 · 0 comments · May be fixed by #328 or #332
Open

🔐 CVE-2024-23454: org.apache.hadoop:hadoop-common:jar:3.3.6:compile #327

github-actions bot opened this issue Sep 28, 2024 · 0 comments · May be fixed by #328 or #332
Assignees
Labels
security Security related change

Comments

@github-actions
Copy link

Summary

Apache Hadoop�s RunJar.run() does not set permissions for temporary directory by default. If sensitive data will be present in this file, all the other local users may be able to view the content.
This is because, on unix-like systems, the system temporary directory is
shared between all local users. As such, files written in this directory,
without setting the correct posix permissions explicitly, may be viewable
by all other local users.

CVE: CVE-2024-23454
CWE: CWE-269

References

@github-actions github-actions bot added the security Security related change label Sep 28, 2024
@github-actions github-actions bot linked a pull request Sep 28, 2024 that will close this issue
@Shmuma Shmuma self-assigned this Oct 21, 2024
@Shmuma Shmuma linked a pull request Oct 24, 2024 that will close this issue
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security Security related change
Projects
None yet
1 participant