Bug 1224173 (CVE-2024-32465) - VUL-0: CVE-2024-32465: git: arbitrary code execution during clone operations
Summary: VUL-0: CVE-2024-32465: git: arbitrary code execution during clone operations
Status: NEW
Alias: CVE-2024-32465
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/404999/
Whiteboard: CVSSv3.1:SUSE:CVE-2024-32465:8.8:(AV:...
Keywords:
Depends on: 1225686
Blocks:
  Show dependency treegraph
 
Reported: 2024-05-13 13:05 UTC by Gabriele Sonnu
Modified: 2024-07-12 16:30 UTC (History)
4 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 3 Alexander Bergmann 2024-05-15 05:12:06 UTC
Public now.

Description

Git is a revision control system. The Git project recommends to avoid working in untrusted repositories, and instead to clone it first with `git clone --no-local` to obtain a clean copy. Git has specific protections to make that a safe operation even with an untrusted source repository, but vulnerabilities allow those protections to be bypassed. In the context of cloning local repositories owned by other users, this vulnerability has been covered in CVE-2024-32004. But there are circumstances where the fixes for CVE-2024-32004 are not enough: For example, when obtaining a `.zip` file containing a full copy of a Git repository, it should not be trusted by default to be safe, as e.g. hooks could be configured to run within the context of that repository. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. As a workaround, avoid using Git in repositories that have been obtained via archives from untrusted sources.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-32465
Comment 4 Andreas Stieger 2024-05-15 05:55:15 UTC
https://build.opensuse.org/request/show/1174111
Comment 5 Andreas Stieger 2024-05-15 07:57:31 UTC
Tumbleweed: https://build.opensuse.org/request/show/1174145
Comment 10 Maintenance Automation 2024-05-29 08:30:12 UTC
SUSE-SU-2024:1807-1: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1224168, 1224170, 1224171, 1224172, 1224173
CVE References: CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465
Maintenance Incident: [SUSE:Maintenance:33869](https://smelt.suse.de/incident/33869/)
Sources used:
openSUSE Leap 15.5 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Micro 5.5 (src):
 git-2.35.3-150300.10.39.1
Basesystem Module 15-SP5 (src):
 git-2.35.3-150300.10.39.1
Development Tools Module 15-SP5 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src):
 git-2.35.3-150300.10.39.1
SUSE Linux Enterprise Server for SAP Applications 15 SP4 (src):
 git-2.35.3-150300.10.39.1
SUSE Manager Proxy 4.3 (src):
 git-2.35.3-150300.10.39.1
SUSE Manager Retail Branch Server 4.3 (src):
 git-2.35.3-150300.10.39.1
SUSE Manager Server 4.3 (src):
 git-2.35.3-150300.10.39.1
SUSE Enterprise Storage 7.1 (src):
 git-2.35.3-150300.10.39.1
openSUSE Leap 15.3 (src):
 git-2.35.3-150300.10.39.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Maintenance Automation 2024-07-02 16:30:07 UTC
SUSE-SU-2024:2277-1: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1224168, 1224170, 1224171, 1224172, 1224173
CVE References: CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465
Maintenance Incident: [SUSE:Maintenance:34509](https://smelt.suse.de/incident/34509/)
Sources used:
Basesystem Module 15-SP6 (src):
 git-2.43.0-150600.3.3.1
Development Tools Module 15-SP6 (src):
 git-2.43.0-150600.3.3.1
openSUSE Leap 15.6 (src):
 git-2.43.0-150600.3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 14 Maintenance Automation 2024-07-12 16:30:56 UTC
SUSE-SU-2024:1807-2: An update that solves five vulnerabilities can now be installed.

Category: security (important)
Bug References: 1224168, 1224170, 1224171, 1224172, 1224173
CVE References: CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465
Maintenance Incident: [SUSE:Maintenance:33869](https://smelt.suse.de/incident/33869/)
Sources used:
SUSE Linux Enterprise Micro 5.5 (src):
 git-2.35.3-150300.10.39.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.