Bug 1224172 (CVE-2024-32021) - VUL-0: CVE-2024-32021: git: git may create hardlinks to arbitrary user-readable files
Summary: VUL-0: CVE-2024-32021: git: git may create hardlinks to arbitrary user-readab...
Status: NEW
Alias: CVE-2024-32021
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/404997/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-32021:3.9:(AV:...
Keywords:
Depends on: 1225686
Blocks:
  Show dependency treegraph
 
Reported: 2024-05-13 13:02 UTC by Gabriele Sonnu
Modified: 2024-07-12 16:30 UTC (History)
4 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 3 Alexander Bergmann 2024-05-15 05:12:00 UTC
Public now.

Description

Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, when cloning a local source repository that contains symlinks via the filesystem, Git may create hardlinks to arbitrary user-readable files on the same filesystem as the target repository in the `objects/` directory. Cloning a local repository over the filesystem may creating hardlinks to arbitrary user-owned files on the same filesystem in the target Git repository's `objects/` directory. When cloning a repository over the filesystem (without explicitly specifying the `file://` protocol or `--no-local`), the optimizations for local cloning will be used, which include attempting to hard link the object files instead of copying them. While the code includes checks against symbolic links in the source repository, which were added during the fix for CVE-2022-39253, these checks can still be raced because the hard link operation ultimately follows symlinks. If the object on the filesystem appears as a file during the check, and then a symlink during the operation, this will allow the adversary to bypass the check and create hardlinks in the destination objects directory to arbitrary, user-readable files. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-32021
Comment 4 Andreas Stieger 2024-05-15 05:55:17 UTC
https://build.opensuse.org/request/show/1174111
Comment 5 Andreas Stieger 2024-05-15 07:57:31 UTC
Tumbleweed: https://build.opensuse.org/request/show/1174145
Comment 10 Maintenance Automation 2024-05-29 08:30:12 UTC
SUSE-SU-2024:1807-1: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1224168, 1224170, 1224171, 1224172, 1224173
CVE References: CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465
Maintenance Incident: [SUSE:Maintenance:33869](https://smelt.suse.de/incident/33869/)
Sources used:
openSUSE Leap 15.5 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Micro 5.5 (src):
 git-2.35.3-150300.10.39.1
Basesystem Module 15-SP5 (src):
 git-2.35.3-150300.10.39.1
Development Tools Module 15-SP5 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 git-2.35.3-150300.10.39.1
SUSE Manager Proxy 4.3 (src):
 git-2.35.3-150300.10.39.1
SUSE Manager Retail Branch Server 4.3 (src):
 git-2.35.3-150300.10.39.1
SUSE Manager Server 4.3 (src):
 git-2.35.3-150300.10.39.1
SUSE Enterprise Storage 7.1 (src):
 git-2.35.3-150300.10.39.1
openSUSE Leap 15.3 (src):
 git-2.35.3-150300.10.39.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Maintenance Automation 2024-07-02 16:30:07 UTC
SUSE-SU-2024:2277-1: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1224168, 1224170, 1224171, 1224172, 1224173
CVE References: CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465
Maintenance Incident: [SUSE:Maintenance:34509](https://smelt.suse.de/incident/34509/)
Sources used:
Basesystem Module 15-SP6 (src):
 git-2.43.0-150600.3.3.1
Development Tools Module 15-SP6 (src):
 git-2.43.0-150600.3.3.1
openSUSE Leap 15.6 (src):
 git-2.43.0-150600.3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Maintenance Automation 2024-07-12 16:30:56 UTC
SUSE-SU-2024:1807-2: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1224168, 1224170, 1224171, 1224172, 1224173
CVE References: CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465
Maintenance Incident: [SUSE:Maintenance:33869](https://smelt.suse.de/incident/33869/)
Sources used:
SUSE Linux Enterprise Micro 5.5 (src):
 git-2.35.3-150300.10.39.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.