Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-32020

Опубликовано: 14 мая 2024
Источник: redhat
CVSS3: 3.9
EPSS Низкий

Описание

Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, local clones may end up hardlinking files into the target repository's object database when source and target repository reside on the same disk. If the source repository is owned by a different user, then those hardlinked files may be rewritten at any point in time by the untrusted user. Cloning local repositories will cause Git to either copy or hardlink files of the source repository into the target repository. This significantly speeds up such local clones compared to doing a "proper" clone and saves both disk space and compute time. When cloning a repository located on the same disk that is owned by a different user than the current user we also end up creating such hardlinks. These files will continue to be owned and controlled by the potentially-untrusted user and can be rewritten by them at will in the future. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.

A vulnerability was found in Git. This flaw allows an unauthenticated attacker to place a specialized repository on their target's local system. For performance reasons, Git uses hardlinks when cloning a repository located on the same disk. However, if the repo being cloned is owned by a different user, this can introduce a security risk. At any time in the future, the original repo owner could rewrite the hardlinked files in the cloned user's repo.

Отчет

This vulnerability presents a Low severity issue due to its contextual constraints and limited impact potential. Primarily affecting local Git repository clones where source and target repositories reside on the same disk, the risk arises only when the source repository is owned by a different, potentially untrusted user. This scenario necessitates specific conditions for exploitation, such as shared access to the disk among multiple users. Moreover, the impact is localized to the affected repositories and does not extend to the broader system or network. While the integrity of the target repository may be compromised if the untrusted user modifies linked files, the scope of influence is contained within the repository structure.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10gitFix deferred
Red Hat Enterprise Linux 6gitOut of support scope
Red Hat Enterprise Linux 7gitOut of support scope
Red Hat Fuse 7gitFix deferred
Red Hat Software Collectionsrh-git227-gitFix deferred
Red Hat Enterprise Linux 8gitFixedRHSA-2024:408425.06.2024
Red Hat Enterprise Linux 9gitFixedRHSA-2024:408325.06.2024
Red Hat Enterprise Linux 9.2 Extended Update SupportgitFixedRHSA-2024:436808.07.2024

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-62

EPSS

Процентиль: 4%
0.00023
Низкий

3.9 Low

CVSS3

Связанные уязвимости

CVSS3: 3.9
ubuntu
около 1 года назад

Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, local clones may end up hardlinking files into the target repository's object database when source and target repository reside on the same disk. If the source repository is owned by a different user, then those hardlinked files may be rewritten at any point in time by the untrusted user. Cloning local repositories will cause Git to either copy or hardlink files of the source repository into the target repository. This significantly speeds up such local clones compared to doing a "proper" clone and saves both disk space and compute time. When cloning a repository located on the same disk that is owned by a different user than the current user we also end up creating such hardlinks. These files will continue to be owned and controlled by the potentially-untrusted user and can be rewritten by them at will in the future. The problem has been patched in versions 2.45.1, 2.44.1...

CVSS3: 3.9
nvd
около 1 года назад

Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, local clones may end up hardlinking files into the target repository's object database when source and target repository reside on the same disk. If the source repository is owned by a different user, then those hardlinked files may be rewritten at any point in time by the untrusted user. Cloning local repositories will cause Git to either copy or hardlink files of the source repository into the target repository. This significantly speeds up such local clones compared to doing a "proper" clone and saves both disk space and compute time. When cloning a repository located on the same disk that is owned by a different user than the current user we also end up creating such hardlinks. These files will continue to be owned and controlled by the potentially-untrusted user and can be rewritten by them at will in the future. The problem has been patched in versions 2.45.1, 2.44.1, 2

CVSS3: 3.9
msrc
9 месяцев назад

Описание отсутствует

CVSS3: 3.9
debian
около 1 года назад

Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2. ...

CVSS3: 3.9
fstec
около 1 года назад

Уязвимость распределенной системы контроля версий Git, связанная с ненадлежащим сохранением разрешений, позволяющая нарушителю создавать жесткие ссылки на произвольные файлы, доступные для чтения, в той же файловой системе

EPSS

Процентиль: 4%
0.00023
Низкий

3.9 Low

CVSS3