Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

#4348:updated the guava version to 32.0.0.-andriod #4399

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

Nanmozhi22
Copy link
Contributor

No description provided.

@CLAassistant
Copy link

CLAassistant commented May 31, 2024

CLA assistant check
All committers have signed the CLA.

@venetrius venetrius assigned venetrius and psavidis and unassigned venetrius Jun 3, 2024
@Nanmozhi22
Copy link
Contributor Author

@psavidis

Hello, We have opened this contribution as part of the depend bot alert - CVE-2020-8908 , Affected versions - < 32.0.0-android. Would you be able to review this and share your comments ?

Here is the description :

A temp directory creation vulnerability exists in Guava prior to version 32.0.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava com.google.common.io.Files.createTempDir(). The permissions granted to the directory created default to the standard unix-like /tmp ones, leaving the files open. Maintainers recommend explicitly changing the permissions after the creation of the directory, or removing uses of the vulnerable method.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants