CVE-2024-32002
Publication date 14 May 2024
Last updated 19 September 2024
Ubuntu priority
Cvss 3 Severity Score
Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a `.git/` directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources.
Status
Package | Ubuntu Release | Status |
---|---|---|
git | 24.04 LTS noble |
Fixed 1:2.43.0-1ubuntu7.1
|
22.04 LTS jammy |
Fixed 1:2.34.1-1ubuntu1.11
|
|
20.04 LTS focal |
Fixed 1:2.25.1-1ubuntu3.13
|
|
18.04 LTS bionic |
Fixed 1:2.17.1-1ubuntu0.18+esm1
|
|
16.04 LTS xenial |
Not affected
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProNotes
leosilva
One can avoid it if symbolic link support is disable "config --global core.symlinks false" This issue exploits case insensitivity. As in Linux Ext4 has an option to turn on case insensitivity Linux could be a target. This issue was not reproducible, but fixed in all releases but Focal, Bionic and xenial, where source is not backportable in a first glance. Pending further investigation.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.0 · Critical |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Changed |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-6793-1
- Git vulnerabilities
- 28 May 2024
- USN-6793-2
- Git vulnerability
- 18 June 2024
- USN-7023-1
- Git vulnerabilities
- 19 September 2024
Other references
- https://www.cve.org/CVERecord?id=CVE-2024-32002
- https://github.com/git/git/security/advisories/GHSA-8h77-4q3w-gfgv
- https://github.com/git/git/commit/97065761333fd62db1912d81b489db938d8c991d
- https://git-scm.com/docs/git-clone#Documentation/git-clone.txt---recurse-submodulesltpathspecgt
- https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks