As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process.

Project Subscriptions

Vendors Products
Fedoraproject Subscribe
Agile Engineering Data Management Subscribe
Api Gateway Subscribe
Banking Platform Subscribe
Banking Treasury Management Subscribe
Communications Unified Inventory Management Subscribe
Data Integrator Subscribe
Endeca Information Discovery Studio Subscribe
Enterprise Repository Subscribe
Financial Services Analytical Applications Infrastructure Subscribe
Flexcube Private Banking Subscribe
Primavera Gateway Subscribe
Primavera Unifier Subscribe
Real-time Decision Server Subscribe
Retail Advanced Inventory Planning Subscribe
Retail Assortment Planning Subscribe
Retail Category Management Planning \& Optimization Subscribe
Retail Eftlink Subscribe
Retail Financial Integration Subscribe
Retail Integration Bus Subscribe
Retail Item Planning Subscribe
Retail Macro Space Optimization Subscribe
Retail Merchandise Financial Planning Subscribe
Retail Merchandising System Subscribe
Retail Predictive Application Server Subscribe
Retail Regular Price Optimization Subscribe
Retail Replenishment Optimization Subscribe
Retail Service Backbone Subscribe
Retail Size Profile Optimization Subscribe
Retail Store Inventory Management Subscribe
Retail Xstore Point Of Service Subscribe
Storagetek Acsls Subscribe
Storagetek Tape Analytics Subscribe
Timesten In-memory Database Subscribe
Utilities Framework Subscribe
Openshift Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0549 Code injection in Apache Ant
Github GHSA Github GHSA GHSA-f62v-xpxf-3v68 Code injection in Apache Ant
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
https://github.com/gradle/gradle/security/advisories/GHSA-j45w-qrgf-25vm cve-icon cve-icon
https://lists.apache.org/thread.html/r107ea1b1a7a214bc72fe1a04207546ccef542146ae22952e1013b5cc%40%3Cdev.creadur.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r1dc8518dc99c42ecca5ff82d0d2de64cd5d3a4fa691eb9ee0304781e%40%3Cdev.creadur.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r2306b67f20c24942b872b0a41fbdc9330e8467388158bcd19c1094e0%40%3Cdev.creadur.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r4ca33fad3fb39d130cda287d5a60727d9e706e6f2cf2339b95729490%40%3Cdev.creadur.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r5e1cdd79f019162f76414708b2092acad0a6703d666d72d717319305%40%3Cdev.creadur.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/raaeddc41da8f3afb1cb224876084a45f68e437a0afd9889a707e4b0c%40%3Cdev.creadur.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rbfe9ba28b74f39f46ec1bbbac3bef313f35017cf3aac13841a84483a%40%3Cdev.creadur.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rc3c8ef9724b5b1e171529b47f4b35cb7920edfb6e917fa21eb6c64ea%40%3Cdev.ant.apache.org%3E cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AALW42FWNQ35F7KB3JVRC6NBVV7AAYYI/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DYBRN5C2RW7JRY75IB7Q7ZVKZCHWAQWS/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3NRQQ7ECII4ZNGW7GBC225LVYMPQEKB/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2020-11979 cve-icon
https://security.gentoo.org/glsa/202011-18 cve-icon cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2020-11979 cve-icon
https://www.oracle.com//security-alerts/cpujul2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuApr2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2021.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujan2022.html cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuoct2021.html cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T11:48:57.549Z

Reserved: 2020-04-21T00:00:00

Link: CVE-2020-11979

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-01T20:15:13.033

Modified: 2024-11-21T04:59:02.170

Link: CVE-2020-11979

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-10-01T00:00:00Z

Links: CVE-2020-11979 - Bugzilla

cve-icon OpenCVE Enrichment

No data.