Git is a widely-popular distributed version control system for collaborative software development.
It can be installed on machines running Windows, macOS, Linux, and various *BSD distributions.
Web-based software development platforms GitHub and GitLab are based on Git.
Visual Studio, Microsoft's integrated development environment, has Git tooling built directly into it, and other IDEs rely on it.
CVE-2024-32002 is a critical vulnerability that allows specially crafted Git repositories with submodules to trick Git into writing files into a.git/ directory instead of the submodule's worktree.
CVE-2024-32465 may allow attackers to bypass protections for cloning untrusted repositories, CVE-2024-32020 may allow untrusted users to modify objects in the cloned repository, and CVE-2024-32021 may be used to manipulate Git into writing files outside the Git worktree and outside the.
He also shared that more changes have been made to Git to make the cloning process more secure: improvements to protect against remote code execution, better handling of symbolic links and directories, a more secure way of running hooks, and more.
Fixed versions of Git have been embedded in the latest GitHub Desktop releases.
Fixes for CVE-2024-32002 and CVE-2024-32004 have been implemented in Visual Studio.
The fact that Git is so widely used and repository cloning is a very common operation makes CVE-2024-32004 a significant risk, but updating Git or disabling symbolic link support in it eliminates the possibility of a successful attack.
Perform one of these actions as soon as possible, because creating an exploit and leveraging it is professedly easy.
This Cyber News was published on www.helpnetsecurity.com. Publication date: Fri, 17 May 2024 10:43:06 +0000