Apache Ant site Apache Ant logo

the Apache Ant site
Home
Projects
 

Apache Ant Security Reports

Reporting New Security Problems with Apache Ant

The Apache Software Foundation takes a very active stance in eliminating security problems and denial of service attacks against its products.

We strongly encourage folks to report such problems to our private security mailing list first, before disclosing them in a public forum.

Please note that the security mailing list should only be used for reporting undisclosed security vulnerabilities and managing the process of fixing such vulnerabilities. We cannot accept regular bug reports or other queries at this address. All mail sent to this address that does not relate to an undisclosed security problem in our source code will be ignored.

If you need to report a bug that isn't an undisclosed security vulnerability, please use the bug reporting page.

Questions about:

should be addressed to the users mailing list. Please see the mailing lists page for details of how to subscribe.

The private security mailing address is: security@apache.org

Apache Ant Security Vulnerabilities

This page lists all security vulnerabilities fixed in released versions of Apache Ant. Each vulnerability is given a security impact rating by the development team - please note that this rating may vary from platform to platform. We also list the versions of Ant the flaw is known to affect, and where a flaw has not been verified list the version with a question mark.

Please note that binary patches are never provided. If you need to apply a source code patch, use the building instructions for the Ant version that you are using.

If you need help on building Ant or other help on following the instructions to mitigate the known vulnerabilities listed here, please send your questions to the public Ant Users mailing list.

If you have encountered an unlisted security vulnerability or other unexpected behaviour that has security impact, or if the descriptions here are incomplete, please report them privately to the Apache Security Team. Thank you.

Fixed in Apache Ant 1.8.4

Low: Denial of Service CVE-2012-2098

The bzip2 compressing streams in Apache Ant internally use sorting algorithms with unacceptable worst-case performance on very repetitive inputs. A specially crafted input to Ants' <bzip2> task can be used to make the process spend a very long time while using up all available processing time effectively leading to a denial of service.

This was fixed in revisions 1340895 and 1340990.

This was first reported to the Security Team on 12 April 2012 and made public on 23 May 2012.

Affects: 1.5 - 1.8.3

Errors and Ommissions

Please report any errors or omissions to the dev mailing list.