vulnerability

SUSE: CVE-2020-11979: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Oct 1, 2020
Added
Aug 9, 2024
Modified
Aug 9, 2024

Description

As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process.

Solutions

suse-upgrade-antsuse-upgrade-ant-antlrsuse-upgrade-ant-apache-bcelsuse-upgrade-ant-apache-bsfsuse-upgrade-ant-apache-log4jsuse-upgrade-ant-apache-orosuse-upgrade-ant-apache-regexpsuse-upgrade-ant-apache-resolversuse-upgrade-ant-apache-xalan2suse-upgrade-ant-commons-loggingsuse-upgrade-ant-commons-netsuse-upgrade-ant-contribsuse-upgrade-ant-contrib-javadocsuse-upgrade-ant-contrib-manualsuse-upgrade-ant-imageiosuse-upgrade-ant-javadocsuse-upgrade-ant-javamailsuse-upgrade-ant-jdependsuse-upgrade-ant-jmfsuse-upgrade-ant-jschsuse-upgrade-ant-junitsuse-upgrade-ant-junit5suse-upgrade-ant-manualsuse-upgrade-ant-scalasuse-upgrade-ant-scriptssuse-upgrade-ant-swingsuse-upgrade-ant-testutilsuse-upgrade-ant-xzsuse-upgrade-antlrsuse-upgrade-antlr-bootstrapsuse-upgrade-antlr-develsuse-upgrade-antlr-javasuse-upgrade-antlr-manualsuse-upgrade-antlr3-bootstrap-toolsuse-upgrade-antlr3-javasuse-upgrade-antlr3-java-javadocsuse-upgrade-antlr3-javadocsuse-upgrade-antlr3-toolsuse-upgrade-antlr4-javasuse-upgrade-antlr4-javadocsuse-upgrade-antlr4-maven-pluginsuse-upgrade-antlr4-toolsuse-upgrade-groovy-antsuse-upgrade-jetty-antsuse-upgrade-jsch-agent-proxy-pageantsuse-upgrade-libantlr4-runtime-develsuse-upgrade-maven-antrun-pluginsuse-upgrade-maven-antrun-plugin-javadocsuse-upgrade-maven-plugin-tools-antsuse-upgrade-maven-script-antsuse-upgrade-paranamer-antsuse-upgrade-plexus-ant-factorysuse-upgrade-plexus-ant-factory-javadoc
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.