Hive creates a credentials file to a temporary directory in the file system with permissions 644 by default when the file permissions are not set explicitly. Any unauthorized user having access to the directory can read the sensitive information written into this file. Users are recommended to upgrade to version 4.0.1, which fixes this issue.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://github.com/apache/hive | product |
https://github.com/apache/hive/commit/20106e254527f7d71b2e34455c4322e14950c620 | patch |
https://issues.apache.org/jira/browse/HIVE-28134 | issue tracking |
https://lists.apache.org/thread/h27ohpyrqf9w1m3c0tqr7x8jg59rcrv6 | vendor advisory mailing list |
http://www.openwall.com/lists/oss-security/2025/01/28/4 | mailing list third party advisory |