DEBIAN-CVE-2020-12278

Source
https://security-tracker.debian.org/tracker/CVE-2020-12278
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2020-12278.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2020-12278
Upstream
Published
2020-04-27T17:15:13Z
Modified
2025-09-19T06:26:39Z
Summary
[none]
Details

An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. path.c mishandles equivalent filenames that exist because of NTFS Alternate Data Streams. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1352.

References

Affected packages

Debian:11 / libgit2

Package

Name
libgit2
Purl
pkg:deb/debian/libgit2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.28.4+dfsg.1-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / libgit2

Package

Name
libgit2
Purl
pkg:deb/debian/libgit2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.28.4+dfsg.1-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / libgit2

Package

Name
libgit2
Purl
pkg:deb/debian/libgit2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.28.4+dfsg.1-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / libgit2

Package

Name
libgit2
Purl
pkg:deb/debian/libgit2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.28.4+dfsg.1-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}