Git version 2.45.1 and earlier may create hardlinks to arbitrary user-readable files during local repository clonin
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | CBL Mariner 2.0 Security Update: git (CVE-2024-32021) | 3 Jul 202400:00 | – | nessus |
![]() | EulerOS 2.0 SP10 : git (EulerOS-SA-2024-1882) | 15 Jul 202400:00 | – | nessus |
![]() | EulerOS 2.0 SP12 : git (EulerOS-SA-2024-2350) | 10 Sep 202400:00 | – | nessus |
![]() | Amazon Linux 2023 : git, git-all, git-core (ALAS2023-2024-623) | 28 May 202400:00 | – | nessus |
![]() | EulerOS 2.0 SP11 : git (EulerOS-SA-2024-2098) | 8 Aug 202400:00 | – | nessus |
![]() | EulerOS 2.0 SP9 : git (EulerOS-SA-2024-2365) | 12 Sep 202400:00 | – | nessus |
![]() | Alibaba Cloud Linux 3 : 0148: git (ALINUX3-SA-2024:0148) | 14 May 202500:00 | – | nessus |
![]() | EulerOS 2.0 SP11 : git (EulerOS-SA-2024-2081) | 8 Aug 202400:00 | – | nessus |
![]() | Amazon Linux 2 : git (ALAS-2024-2548) | 31 May 202400:00 | – | nessus |
![]() | Amazon Linux AMI : git (ALAS-2024-1939) | 5 Jun 202400:00 | – | nessus |
[
{
"vendor": "git",
"product": "git",
"versions": [
{
"version": "= 2.45.0",
"status": "affected"
},
{
"version": "= 2.44.0",
"status": "affected"
},
{
"version": ">= 2.43.0, < 2.43.4",
"status": "affected"
},
{
"version": ">= 2.42.0, < 2.42.2",
"status": "affected"
},
{
"version": "= 2.41.0",
"status": "affected"
},
{
"version": ">= 2.40.0, < 2.40.2",
"status": "affected"
},
{
"version": "< 2.39.4",
"status": "affected"
}
]
}
]
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
.. | path | /git/objects/host | Git may create hardlinks to arbitrary user-readable files when cloning a local repository containing symlinks, allowing an adversary to access sensitive files. | CWE-547 |
.. | nested | /git/objects/host | The vulnerability exploited allows symlinks to be created to sensitive files, exposing them through the Git objects directory. | CWE-547 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo