Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Improve][CVE] Guava vulnerable to insecure use of temporary directory #9644

Closed
2 tasks done
dockerzhang opened this issue Feb 1, 2024 · 0 comments · Fixed by #9645
Closed
2 tasks done

[Improve][CVE] Guava vulnerable to insecure use of temporary directory #9644

dockerzhang opened this issue Feb 1, 2024 · 0 comments · Fixed by #9645
Assignees
Milestone

Comments

@dockerzhang
Copy link
Contributor

Description

Use of Java's default temporary directory for file creation in FileBackedOutputStream in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.

InLong Component

Other for not specified component

Are you willing to submit PR?

  • Yes, I am willing to submit a PR!

Code of Conduct

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant