First published: Tue Jan 28 2025(Updated: )
Hive creates a credentials file to a temporary directory in the file system with permissions 644 by default when the file permissions are not set explicitly. Any unauthorized user having access to the directory can read the sensitive information written into this file. Users are recommended to upgrade to version 4.0.1, which fixes this issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Hive | <4.0.1 | |
maven/org.apache.hive:hive-exec | <4.0.1 | 4.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-29869 is critical due to potential unauthorized access to sensitive credential information.
To fix CVE-2024-29869, update to Apache Hive version 4.0.1 or later, ensuring file permissions are explicitly set to restrict access.
The risks associated with CVE-2024-29869 include exposure of sensitive information to unauthorized users if the temporary directory's permissions are not properly configured.
Apache Hive versions prior to 4.0.1 are affected by CVE-2024-29869.
Yes, CVE-2024-29869 arises due to default file permissions of 644 being set for credentials files when permissions are not explicitly defined.