As mitigation for CVE-2020-1945 Apache Ant 1.10.8 changed the permissions of temporary files it created so that only the current user was allowed to access them. Unfortunately the fixcrlf task deleted the temporary file and created a new one without said protection, effectively nullifying the effort. This would still allow an attacker to inject modified source files into the build process.
The product creates a temporary file in a directory whose permissions allow unintended actors to determine the file’s existence or otherwise access that file.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ant | Apache | 1.10.8 (including) | 1.10.8 (including) |
Red Hat OpenShift Container Platform 3.11 | RedHat | jenkins-0:2.263.3.1612433584-1.el7 | * |
Red Hat OpenShift Container Platform 4.5 | RedHat | conmon-2:2.0.21-1.rhaos4.5.el7 | * |
Red Hat OpenShift Container Platform 4.5 | RedHat | jenkins-0:2.263.3.1612434332-1.el7 | * |
Red Hat OpenShift Container Platform 4.5 | RedHat | machine-config-daemon-0:4.5.0-202102050524.p0.git.2594.ff3b8c0.el8 | * |
Red Hat OpenShift Container Platform 4.5 | RedHat | openshift-0:4.5.0-202102050524.p0.git.0.9229406.el8 | * |
Red Hat OpenShift Container Platform 4.5 | RedHat | openshift-ansible-0:4.5.0-202102031005.p0.git.0.c6839a2.el7 | * |
Red Hat OpenShift Container Platform 4.5 | RedHat | openshift-clients-0:4.5.0-202102051529.p0.git.3612.61b096a.el7 | * |
Red Hat OpenShift Container Platform 4.5 | RedHat | runc-0:1.0.0-72.rhaos4.5.giteadfc6b.el8 | * |
Red Hat OpenShift Container Platform 4.6 | RedHat | jenkins-0:2.263.3.1612434510-1.el8 | * |
Ant | Ubuntu | bionic | * |
Ant | Ubuntu | groovy | * |
Ant | Ubuntu | trusty | * |
Ant | Ubuntu | trusty/esm | * |
Ant | Ubuntu | xenial | * |