Your submission was sent successfully! Close


Published: 14 May 2020

Apache Ant 1.1 to 1.9.14 and 1.10.0 to 1.10.7 uses the default temporary directory identified by the Java system property for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process.

From the Ubuntu security team

It was discovered that Apache Ant created temporary files with insecure permissions. An attacker could use this vulnerability to read sensitive information leaked into /tmp, or potentially inject malicious code into a project that is built with Apache Ant.



CVSS 3 base score: 6.3


Package Release Status
Launchpad, Ubuntu, Debian
Upstream Needed

Ubuntu 21.10 (Impish Indri) Not vulnerable
Ubuntu 21.04 (Hirsute Hippo) Not vulnerable
Ubuntu 20.04 LTS (Focal Fossa) Needed

Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 ESM (Xenial Xerus) Ignored
(end of standard support, was needed)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (1.9.3-2ubuntu0.1+esm1)
Upstream:;a=commit;h=9c1f4d905da59bf446570ac28df5b68a37281f35 (1.9.x, 1.10.x)
Upstream:;a=commit;h=926f339ea30362bec8e53bf5924ce803938163b7 (1.9.x, 1.10.x)
Upstream:;a=commit;h=041b058c7bf10a94d56db3ca9dba38cf90ab9943 (1.10.x)
Upstream:;a=commit;h=a8645a151bc706259fb1789ef587d05482d98612 (1.10.x)


There are two potential mitigations for this vulnerability.
1) Set your umask to 077.
2) Set your JVM's system property to a directory
only readable and writable by the current user running Ant.
The fix for this CVE is incomplete. CVE-2020-11979 finishes resolving the issue.