First published: Mon Apr 27 2020(Updated: )
An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. checkout.c mishandles equivalent filenames that exist because of NTFS short names. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1353.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libgit2 | <=0.27.7+dfsg.1-0.2 | 0.27.7+dfsg.1-0.2+deb10u2 1.1.0+dfsg.1-4+deb11u1 1.1.0+dfsg.1-4+deb11u2 1.5.1+ds-1 1.5.1+ds-1+deb12u1 1.7.2+ds-1 |
ubuntu/libgit2 | <0.26.0+dfsg.1-1.1ubuntu0.2+ | 0.26.0+dfsg.1-1.1ubuntu0.2+ |
ubuntu/libgit2 | <0.28.4<0.99.0 | 0.28.4 0.99.0 |
ubuntu/libgit2 | <0.24.1-2ubuntu0.2+ | 0.24.1-2ubuntu0.2+ |
libgit2 | <0.28.4 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-12279 is a vulnerability discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0 that mishandles equivalent filenames that exist because of NTFS short names, potentially allowing remote code execution when cloning a repository.
The severity of CVE-2020-12279 is critical, with a severity score of 9.8.
CVE-2020-12279 affects Libgit2 versions before 0.28.4 and 0.9x before 0.99.0 by mishandling equivalent filenames due to NTFS short names, which could lead to remote code execution during repository cloning.
To fix CVE-2020-12279, update Libgit2 to version 0.28.4 or later.
Yes, here are some references for CVE-2020-12279: - [GitHub Security Advisory](https://github.com/git/git/security/advisories/GHSA-589j-mmg9-733v) - [Libgit2 Commit](https://github.com/libgit2/libgit2/commit/64c612cc3e25eff5fb02c59ef5a66ba7a14751e4) - [Libgit2 Releases](https://github.com/libgit2/libgit2/releases/tag/v0.28.4)