[
https://issues.apache.org/jira/browse/GEODE-9744?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Anilkumar Gingade updated GEODE-9744:
-------------------------------------
Labels: pull-request-available (was: needsTriage pull-request-available)
> bug like CVE-2020-8908
> ----------------------
>
> Key: GEODE-9744
> URL: https://issues.apache.org/jira/browse/GEODE-9744
> Project: Geode
> Issue Type: Bug
> Reporter: lujie
> Priority: Major
> Labels: pull-request-available
>
> see [https://www.cvedetails.com/cve/CVE-2020-8908/]
> A temp directory creation vulnerability exists in all versions of Guava,
> allowing an attacker with access to the machine to potentially access data in
> a temporary directory created by the Guava API
> com.google.common.io.Files.createTempDir(). By default, on unix-like systems,
> the created directory is world-readable (readable by an attacker with access
> to the system). The method in question has been marked
> [@deprecated|https://github.com/deprecated] in versions 30.0 and later and
> should not be used. For Android developers, we recommend choosing a temporary
> directory API provided by Android, such as context.getCacheDir(). For other
> Java developers, we recommend migrating to the Java 7 API
> java.nio.file.Files.createTempDirectory() which explicitly configures
> permissions of 700, or configuring the Java runtime's java.io.tmpdir system
> property to point to a location whose permissions are appropriately
> configured.
--
This message was sent by Atlassian Jira
(v8.20.1#820001)