CVE-2024-32020
Publication date 14 May 2024
Last updated 19 September 2024
Ubuntu priority
Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, local clones may end up hardlinking files into the target repository's object database when source and target repository reside on the same disk. If the source repository is owned by a different user, then those hardlinked files may be rewritten at any point in time by the untrusted user. Cloning local repositories will cause Git to either copy or hardlink files of the source repository into the target repository. This significantly speeds up such local clones compared to doing a "proper" clone and saves both disk space and compute time. When cloning a repository located on the same disk that is owned by a different user than the current user we also end up creating such hardlinks. These files will continue to be owned and controlled by the potentially-untrusted user and can be rewritten by them at will in the future. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.
Status
Package | Ubuntu Release | Status |
---|---|---|
git | 24.04 LTS noble |
Fixed 1:2.43.0-1ubuntu7.1
|
22.04 LTS jammy |
Fixed 1:2.34.1-1ubuntu1.11
|
|
20.04 LTS focal |
Fixed 1:2.25.1-1ubuntu3.12
|
|
18.04 LTS bionic |
Fixed 1:2.17.1-1ubuntu0.18+esm1
|
|
16.04 LTS xenial |
Not affected
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProReferences
Related Ubuntu Security Notices (USN)
- USN-6793-1
- Git vulnerabilities
- 28 May 2024
- USN-7023-1
- Git vulnerabilities
- 19 September 2024