DEBIAN-CVE-2020-11979

Source
https://security-tracker.debian.org/tracker/CVE-2020-11979
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2020-11979.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2020-11979
Upstream
Published
2020-10-01T20:15:13Z
Modified
2025-09-25T22:40:32Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process.

References

Affected packages

Debian:11 / ant

Package

Name
ant
Purl
pkg:deb/debian/ant?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.10.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / ant

Package

Name
ant
Purl
pkg:deb/debian/ant?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.10.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / ant

Package

Name
ant
Purl
pkg:deb/debian/ant?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.10.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / ant

Package

Name
ant
Purl
pkg:deb/debian/ant?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.10.9-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}