First published: Mon Apr 27 2020(Updated: )
An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. path.c mishandles equivalent filenames that exist because of NTFS Alternate Data Streams. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1352.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libgit2 | <=0.27.7+dfsg.1-0.2 | 0.27.7+dfsg.1-0.2+deb10u2 1.1.0+dfsg.1-4+deb11u1 1.1.0+dfsg.1-4+deb11u2 1.5.1+ds-1 1.5.1+ds-1+deb12u1 1.7.2+ds-1 |
ubuntu/libgit2 | <0.26.0+dfsg.1-1.1ubuntu0.2+ | 0.26.0+dfsg.1-1.1ubuntu0.2+ |
ubuntu/libgit2 | <0.28.4<0.99.0 | 0.28.4 0.99.0 |
ubuntu/libgit2 | <0.24.1-2ubuntu0.2+ | 0.24.1-2ubuntu0.2+ |
libgit2 | <0.28.4 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-12278 is critical, with a CVSS score of 9.8.
The affected software for CVE-2020-12278 is Libgit2 (version up to exclusive 0.28.4) and Debian Linux (version exactly 9.0).
CVE-2020-12278 occurs due to mishandling of equivalent filenames that exist because of NTFS Alternate Data Streams in libgit2.
Yes, CVE-2020-12278 may allow remote code execution when cloning a repository.
To fix CVE-2020-12278, it is recommended to update to a version of libgit2 that is greater than or equal to 0.28.4 or apply the necessary patches.