Update dependency com.google.guava:guava to v32 [SECURITY]#56
Open
renovate[bot] wants to merge 1 commit intomasterfrom
Open
Update dependency com.google.guava:guava to v32 [SECURITY]#56renovate[bot] wants to merge 1 commit intomasterfrom
renovate[bot] wants to merge 1 commit intomasterfrom
Conversation
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #56 +/- ##
============================================
+ Coverage 74.42% 74.49% +0.06%
- Complexity 587 593 +6
============================================
Files 149 150 +1
Lines 2937 2945 +8
Branches 140 141 +1
============================================
+ Hits 2186 2194 +8
+ Misses 636 635 -1
- Partials 115 116 +1 ☔ View full report in Codecov by Sentry. |
82172fe to
670570a
Compare
f3496d7 to
3a8fa41
Compare
3b19d97 to
4bf9db4
Compare
4bf9db4 to
3ec253d
Compare
6316c48 to
f274b7f
Compare
f274b7f to
2bae14f
Compare
2bae14f to
553569a
Compare
2ea32e2 to
3031d64
Compare
3031d64 to
2c190a9
Compare
2c190a9 to
5675579
Compare
5675579 to
7c1dea6
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
31.1-jre→32.0.0-androidGitHub Vulnerability Alerts
CVE-2020-8908
A temp directory creation vulnerability exists in Guava prior to version 32.0.0 allowing an attacker with access to the machine to potentially access data in a temporary directory created by the Guava
com.google.common.io.Files.createTempDir(). The permissions granted to the directory created default to the standard unix-like /tmp ones, leaving the files open. Maintainers recommend explicitly changing the permissions after the creation of the directory, or removing uses of the vulnerable method.CVE-2023-2976
Use of Java's default temporary directory for file creation in
FileBackedOutputStreamin Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.Even though the security vulnerability is fixed in version 32.0.0, maintainers recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.