Bug 1224171 (CVE-2024-32020) - VUL-0: CVE-2024-32020: git: file overwriting vulnerability during local clones
Summary: VUL-0: CVE-2024-32020: git: file overwriting vulnerability during local clones
Status: NEW
Alias: CVE-2024-32020
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/404995/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-32020:3.9:(AV:...
Keywords:
Depends on: 1225686
Blocks:
  Show dependency treegraph
 
Reported: 2024-05-13 12:58 UTC by Gabriele Sonnu
Modified: 2024-07-12 16:30 UTC (History)
3 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 3 Alexander Bergmann 2024-05-15 05:11:55 UTC
Public now.

Description

Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, local clones may end up hardlinking files into the target repository's object database when source and target repository reside on the same disk. If the source repository is owned by a different user, then those hardlinked files may be rewritten at any point in time by the untrusted user. Cloning local repositories will cause Git to either copy or hardlink files of the source repository into the target repository. This significantly speeds up such local clones compared to doing a "proper" clone and saves both disk space and compute time. When cloning a repository located on the same disk that is owned by a different user than the current user we also end up creating such hardlinks. These files will continue to be owned and controlled by the potentially-untrusted user and can be rewritten by them at will in the future. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-32020
Comment 4 Andreas Stieger 2024-05-15 05:55:17 UTC
https://build.opensuse.org/request/show/1174111
Comment 5 Andreas Stieger 2024-05-15 07:57:31 UTC
Tumbleweed: https://build.opensuse.org/request/show/1174145
Comment 11 Maintenance Automation 2024-05-29 08:30:12 UTC
SUSE-SU-2024:1807-1: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1224168, 1224170, 1224171, 1224172, 1224173
CVE References: CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465
Maintenance Incident: [SUSE:Maintenance:33869](https://smelt.suse.de/incident/33869/)
Sources used:
openSUSE Leap 15.5 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Micro 5.5 (src):
 git-2.35.3-150300.10.39.1
Basesystem Module 15-SP5 (src):
 git-2.35.3-150300.10.39.1
Development Tools Module 15-SP5 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 git-2.35.3-150300.10.39.1
SUSE Manager Proxy 4.3 (src):
 git-2.35.3-150300.10.39.1
SUSE Manager Retail Branch Server 4.3 (src):
 git-2.35.3-150300.10.39.1
SUSE Manager Server 4.3 (src):
 git-2.35.3-150300.10.39.1
SUSE Enterprise Storage 7.1 (src):
 git-2.35.3-150300.10.39.1
openSUSE Leap 15.3 (src):
 git-2.35.3-150300.10.39.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Maintenance Automation 2024-07-02 16:30:07 UTC
SUSE-SU-2024:2277-1: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1224168, 1224170, 1224171, 1224172, 1224173
CVE References: CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465
Maintenance Incident: [SUSE:Maintenance:34509](https://smelt.suse.de/incident/34509/)
Sources used:
Basesystem Module 15-SP6 (src):
 git-2.43.0-150600.3.3.1
Development Tools Module 15-SP6 (src):
 git-2.43.0-150600.3.3.1
openSUSE Leap 15.6 (src):
 git-2.43.0-150600.3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 14 Maintenance Automation 2024-07-12 16:30:56 UTC
SUSE-SU-2024:1807-2: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1224168, 1224170, 1224171, 1224172, 1224173
CVE References: CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465
Maintenance Incident: [SUSE:Maintenance:33869](https://smelt.suse.de/incident/33869/)
Sources used:
SUSE Linux Enterprise Micro 5.5 (src):
 git-2.35.3-150300.10.39.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.