Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2020-1945

Published: 14 May 2020

Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process.

From the Ubuntu Security Team

It was discovered that Apache Ant created temporary files with insecure permissions. An attacker could use this vulnerability to read sensitive information leaked into /tmp, or potentially inject malicious code into a project that is built with Apache Ant.

Notes

AuthorNote
msalvatore
There are two potential mitigations for this vulnerability.
1) Set your umask to 077.
2) Set your JVM's java.io.tmpdir system property to a directory
only readable and writable by the current user running Ant.
The fix for this CVE is incomplete. CVE-2020-11979 finishes resolving the issue.

Mitigation

Set the java.io.tmpdir property of the JVM to point to a directory that is not
world read/writable.

Priority

Medium

Cvss 3 Severity Score

6.3

Score breakdown

Status

Package Release Status
ant
Launchpad, Ubuntu, Debian
bionic
Released (1.10.5-3~18.04.1~esm1)
Available with Ubuntu Pro
eoan
Released (1.10.6-1ubuntu0.1)
focal
Released (1.10.7-1ubuntu0.1~esm1)
Available with Ubuntu Pro
groovy Not vulnerable
(1.10.8-1)
hirsute Not vulnerable
(1.10.8-1)
impish Not vulnerable
(1.10.8-1)
jammy Not vulnerable
(1.10.8-1)
kinetic Not vulnerable
(1.10.8-1)
lunar Not vulnerable
(1.10.8-1)
mantic Not vulnerable
(1.10.8-1)
trusty
Released (1.9.3-2ubuntu0.1+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
upstream Needed

xenial
Released (1.9.6-1ubuntu1.1+esm1)
Available with Ubuntu Pro
Patches:
upstream: https://gitbox.apache.org/repos/asf?p=ant.git;a=commit;h=9c1f4d905da59bf446570ac28df5b68a37281f35
upstream: https://gitbox.apache.org/repos/asf?p=ant.git;a=commit;h=926f339ea30362bec8e53bf5924ce803938163b7
upstream: https://gitbox.apache.org/repos/asf?p=ant.git;a=commit;h=041b058c7bf10a94d56db3ca9dba38cf90ab9943
upstream: https://gitbox.apache.org/repos/asf?p=ant.git;a=commit;h=a8645a151bc706259fb1789ef587d05482d98612

Severity score breakdown

Parameter Value
Base score 6.3
Attack vector Local
Attack complexity High
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact None
Vector CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N