vulnerability

SUSE: CVE-2020-11979: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
10/01/2020
Added
08/09/2024
Modified
08/09/2024

Description

As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process.

Solution(s)

suse-upgrade-antsuse-upgrade-ant-antlrsuse-upgrade-ant-apache-bcelsuse-upgrade-ant-apache-bsfsuse-upgrade-ant-apache-log4jsuse-upgrade-ant-apache-orosuse-upgrade-ant-apache-regexpsuse-upgrade-ant-apache-resolversuse-upgrade-ant-apache-xalan2suse-upgrade-ant-commons-loggingsuse-upgrade-ant-commons-netsuse-upgrade-ant-contribsuse-upgrade-ant-contrib-javadocsuse-upgrade-ant-contrib-manualsuse-upgrade-ant-imageiosuse-upgrade-ant-javadocsuse-upgrade-ant-javamailsuse-upgrade-ant-jdependsuse-upgrade-ant-jmfsuse-upgrade-ant-jschsuse-upgrade-ant-junitsuse-upgrade-ant-junit5suse-upgrade-ant-manualsuse-upgrade-ant-scalasuse-upgrade-ant-scriptssuse-upgrade-ant-swingsuse-upgrade-ant-testutilsuse-upgrade-ant-xzsuse-upgrade-antlrsuse-upgrade-antlr-bootstrapsuse-upgrade-antlr-develsuse-upgrade-antlr-javasuse-upgrade-antlr-manualsuse-upgrade-antlr3-bootstrap-toolsuse-upgrade-antlr3-javasuse-upgrade-antlr3-java-javadocsuse-upgrade-antlr3-javadocsuse-upgrade-antlr3-toolsuse-upgrade-antlr4-javasuse-upgrade-antlr4-javadocsuse-upgrade-antlr4-maven-pluginsuse-upgrade-antlr4-toolsuse-upgrade-groovy-antsuse-upgrade-jetty-antsuse-upgrade-jsch-agent-proxy-pageantsuse-upgrade-libantlr4-runtime-develsuse-upgrade-maven-antrun-pluginsuse-upgrade-maven-antrun-plugin-javadocsuse-upgrade-maven-plugin-tools-antsuse-upgrade-maven-script-antsuse-upgrade-paranamer-antsuse-upgrade-plexus-ant-factorysuse-upgrade-plexus-ant-factory-javadoc
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.