vulnerability
SUSE: CVE-2020-11979: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Oct 1, 2020 | Aug 9, 2024 | Aug 9, 2024 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Oct 1, 2020
Added
Aug 9, 2024
Modified
Aug 9, 2024
Description
As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process.
Solutions
suse-upgrade-antsuse-upgrade-ant-antlrsuse-upgrade-ant-apache-bcelsuse-upgrade-ant-apache-bsfsuse-upgrade-ant-apache-log4jsuse-upgrade-ant-apache-orosuse-upgrade-ant-apache-regexpsuse-upgrade-ant-apache-resolversuse-upgrade-ant-apache-xalan2suse-upgrade-ant-commons-loggingsuse-upgrade-ant-commons-netsuse-upgrade-ant-contribsuse-upgrade-ant-contrib-javadocsuse-upgrade-ant-contrib-manualsuse-upgrade-ant-imageiosuse-upgrade-ant-javadocsuse-upgrade-ant-javamailsuse-upgrade-ant-jdependsuse-upgrade-ant-jmfsuse-upgrade-ant-jschsuse-upgrade-ant-junitsuse-upgrade-ant-junit5suse-upgrade-ant-manualsuse-upgrade-ant-scalasuse-upgrade-ant-scriptssuse-upgrade-ant-swingsuse-upgrade-ant-testutilsuse-upgrade-ant-xzsuse-upgrade-antlrsuse-upgrade-antlr-bootstrapsuse-upgrade-antlr-develsuse-upgrade-antlr-javasuse-upgrade-antlr-manualsuse-upgrade-antlr3-bootstrap-toolsuse-upgrade-antlr3-javasuse-upgrade-antlr3-java-javadocsuse-upgrade-antlr3-javadocsuse-upgrade-antlr3-toolsuse-upgrade-antlr4-javasuse-upgrade-antlr4-javadocsuse-upgrade-antlr4-maven-pluginsuse-upgrade-antlr4-toolsuse-upgrade-groovy-antsuse-upgrade-jetty-antsuse-upgrade-jsch-agent-proxy-pageantsuse-upgrade-libantlr4-runtime-develsuse-upgrade-maven-antrun-pluginsuse-upgrade-maven-antrun-plugin-javadocsuse-upgrade-maven-plugin-tools-antsuse-upgrade-maven-script-antsuse-upgrade-paranamer-antsuse-upgrade-plexus-ant-factorysuse-upgrade-plexus-ant-factory-javadoc
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.