4.0.1
13 years ago
4 months ago
Known vulnerabilities in the org.apache.hive:hive-exec package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Incorrect Permission Assignment for Critical Resource due to the default creation of a credentials file with permissions set to 644 in a temporary directory. An attacker that has access to the temporary directory in the file system can read sensitive information by accessing this directory. How to fix Incorrect Permission Assignment for Critical Resource? Upgrade | [,4.0.1) |
org.apache.hive:hive-exec is a package for reading, writing, and managing large datasets residing in distributed storage using SQL. Affected versions of this package are vulnerable to Deserialization of Untrusted Data through the Note: This is only exploitable if the attacker is an authenticated user who has successfully established a connection to the Metastore. How to fix Deserialization of Untrusted Data? Upgrade | [4.0.0-alpha-1,4.0.0-alpha-2) |