Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-32021
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-14 May, 2024 | 20:15
Updated At-05 Jan, 2026 | 19:19

Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, when cloning a local source repository that contains symlinks via the filesystem, Git may create hardlinks to arbitrary user-readable files on the same filesystem as the target repository in the `objects/` directory. Cloning a local repository over the filesystem may creating hardlinks to arbitrary user-owned files on the same filesystem in the target Git repository's `objects/` directory. When cloning a repository over the filesystem (without explicitly specifying the `file://` protocol or `--no-local`), the optimizations for local cloning will be used, which include attempting to hard link the object files instead of copying them. While the code includes checks against symbolic links in the source repository, which were added during the fix for CVE-2022-39253, these checks can still be raced because the hard link operation ultimately follows symlinks. If the object on the filesystem appears as a file during the check, and then a symlink during the operation, this will allow the adversary to bypass the check and create hardlinks in the destination objects directory to arbitrary, user-readable files. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.13.9LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
Primary3.17.1HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 3.9
Base severity: LOW
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L
Type: Primary
Version: 3.1
Base score: 7.1
Base severity: HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
CPE Matches

git-scm
git-scm
>>git>>Versions before 2.39.4(exclusive)
cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*
git-scm
git-scm
>>git>>Versions from 2.40.0(inclusive) to 2.40.2(exclusive)
cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*
git-scm
git-scm
>>git>>Versions from 2.42.0(inclusive) to 2.42.2(exclusive)
cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*
git-scm
git-scm
>>git>>Versions from 2.43.0(inclusive) to 2.43.4(exclusive)
cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*
git-scm
git-scm
>>git>>2.41.0
cpe:2.3:a:git-scm:git:2.41.0:*:*:*:*:*:*:*
git-scm
git-scm
>>git>>2.44.0
cpe:2.3:a:git-scm:git:2.44.0:*:*:*:*:*:*:*
git-scm
git-scm
>>git>>2.45.0
cpe:2.3:a:git-scm:git:2.45.0:*:*:*:*:*:*:*
Fedora Project
fedoraproject
>>fedora>>40
cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>10.0
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>11.0
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-547Secondarysecurity-advisories@github.com
CWE ID: CWE-547
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.openwall.com/lists/oss-security/2024/05/14/2security-advisories@github.com
Mailing List
Third Party Advisory
https://github.com/git/git/security/advisories/GHSA-mvxm-9j2h-qjx7security-advisories@github.com
Exploit
Vendor Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00018.htmlsecurity-advisories@github.com
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/security-advisories@github.com
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/05/14/2af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://github.com/git/git/security/advisories/GHSA-mvxm-9j2h-qjx7af854a3a-2127-422b-91ae-364da2661108
Exploit
Vendor Advisory
https://lists.debian.org/debian-lts-announce/2024/06/msg00018.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2024/09/msg00009.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/af854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2024/05/14/2
Source: security-advisories@github.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://github.com/git/git/security/advisories/GHSA-mvxm-9j2h-qjx7
Source: security-advisories@github.com
Resource:
Exploit
Vendor Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html
Source: security-advisories@github.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/
Source: security-advisories@github.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2024/05/14/2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://github.com/git/git/security/advisories/GHSA-mvxm-9j2h-qjx7
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Vendor Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2024/09/msg00009.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Change History
0Changes found

Details not found