{"id":"CVE-2024-32002","summary":"Git's recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Execution","details":"Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, repositories with submodules can be crafted in a way that exploits a bug in Git whereby it can be fooled into writing files not into the submodule's worktree but into a `.git/` directory. This allows writing a hook that will be executed while the clone operation is still running, giving the user no opportunity to inspect the code that is being executed. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4. If symbolic link support is disabled in Git (e.g. via `git config --global core.symlinks false`), the described attack won't work. As always, it is best to avoid cloning repositories from untrusted sources.","aliases":["BIT-git-2024-32002","GHSA-8h77-4q3w-gfgv"],"modified":"2026-04-16T04:30:58.836989063Z","published":"2024-05-14T18:40:46.652Z","related":["ALSA-2024:4083","ALSA-2024:4084","CGA-qx53-jc4w-4m22","SUSE-SU-2024:1807-1","SUSE-SU-2024:1807-2","SUSE-SU-2024:1854-1","SUSE-SU-2024:2277-1","SUSE-SU-2025:0197-1","SUSE-SU-2025:20049-1","openSUSE-SU-2024:13968-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/32xxx/CVE-2024-32002.json","cwe_ids":["CWE-22","CWE-434"],"cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/05/14/2"},{"type":"WEB","url":"https://git-scm.com/docs/git-clone#Documentation/git-clone.txt---recurse-submodulesltpathspecgt"},{"type":"WEB","url":"https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/06/msg00018.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/09/msg00009.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S4CK4IYTXEOBZTEM5K3T6LWOIZ3S44AR/"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/32xxx/CVE-2024-32002.json"},{"type":"ADVISORY","url":"https://github.com/git/git/security/advisories/GHSA-8h77-4q3w-gfgv"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-32002"},{"type":"FIX","url":"https://github.com/git/git/commit/97065761333fd62db1912d81b489db938d8c991d"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/git/git","events":[{"introduced":"0"},{"last_affected":"786a3e4b8d754d2b14b1208b98eeb0a554ef19a8"},{"last_affected":"3c2a3fdc388747b9eaf4a4a4f2035c1c9ddb26d0"},{"last_affected":"fe86abd7511a9a6862d5706c6fa1d9b57a63ba09"},{"fixed":"47b6d90e91835082010da926f6a844d4441c57a6"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"= 2.45.0"},{"last_affected":"= 2.44.0"},{"last_affected":"= 2.41.0"},{"fixed":"2.39.4"}]}},{"type":"GIT","repo":"https://github.com/git/git","events":[{"introduced":"564d0252ca632e0264ed670534a51d18a689ef5d"},{"fixed":"1f2e64e22dee75db96b92d526d14003ba59a154e"}],"database_specific":{"versions":[{"introduced":"2.43.0"},{"fixed":"2.43.4"}]}},{"type":"GIT","repo":"https://github.com/git/git","events":[{"introduced":"43c8a30d150ecede9709c1f2527c8fba92c65f40"},{"fixed":"babb4e5d7107ba730beff8d224e4bcf065533e0b"}],"database_specific":{"versions":[{"introduced":"2.42.0"},{"fixed":"2.42.2"}]}},{"type":"GIT","repo":"https://github.com/git/git","events":[{"introduced":"73876f4861cd3d187a4682290ab75c9dccadbc56"},{"fixed":"b9b439e0e3a543ddb920e4cf8d3c9d53f730111f"}],"database_specific":{"versions":[{"introduced":"2.40.0"},{"fixed":"2.40.2"}]}}],"versions":["v0.99","v0.99.1","v0.99.2","v0.99.3","v0.99.4","v0.99.5","v0.99.6","v0.99.7","v0.99.8","v0.99.8a","v0.99.8b","v0.99.8c","v0.99.8d","v0.99.8e","v0.99.8f","v0.99.8g","v0.99.9a","v0.99.9b","v0.99.9c","v0.99.9d","v0.99.9e","v0.99.9f","v0.99.9g","v0.99.9h","v0.99.9i","v0.99.9j","v0.99.9k","v0.99.9l","v0.99.9m","v0.99.9n","v1.0.0","v1.0rc1","v1.0rc2","v1.0rc3","v1.0rc4","v1.0rc5","v1.0rc6","v1.1.0","v1.2.0","v1.3.0-rc1","v1.4.1","v1.4.1-rc1","v1.4.1-rc2","v1.4.2","v1.4.2-rc1","v1.4.2-rc2","v1.4.2-rc3","v1.4.2-rc4","v1.4.3","v1.4.3-rc1","v1.4.3-rc2","v1.4.3-rc3","v1.4.4","v1.4.4-rc1","v1.4.4-rc2","v1.4.4.1","v1.5.0","v1.5.0-rc0","v1.5.0-rc1","v1.5.0-rc2","v1.5.0-rc3","v1.5.0-rc4","v1.5.1","v1.5.1-rc1","v1.5.1-rc2","v1.5.1-rc3","v1.5.2","v1.5.2-rc0","v1.5.2-rc1","v1.5.2-rc2","v1.5.2-rc3","v1.5.3","v1.5.3-rc0","v1.5.3-rc1","v1.5.3-rc2","v1.5.3-rc3","v1.5.3-rc4","v1.5.3-rc5","v1.5.3-rc6","v1.5.3-rc7","v1.5.3.1","v1.5.4","v1.5.4-rc0","v1.5.4-rc1","v1.5.4-rc2","v1.5.4-rc3","v1.5.4-rc4","v1.5.4-rc5","v1.5.5","v1.5.5-rc0","v1.5.5-rc1","v1.5.5-rc2","v1.5.5-rc3","v1.5.6","v1.5.6-rc0","v1.5.6-rc1","v1.5.6-rc2","v1.5.6-rc3","v1.6.0","v1.6.0-rc0","v1.6.0-rc1","v1.6.0-rc2","v1.6.0-rc3","v1.6.1","v1.6.1-rc1","v1.6.1-rc2","v1.6.1-rc3","v1.6.1-rc4","v1.6.2","v1.6.2-rc0","v1.6.2-rc1","v1.6.2-rc2","v1.6.3","v1.6.3-rc0","v1.6.3-rc1","v1.6.3-rc2","v1.6.3-rc3","v1.6.3-rc4","v1.6.4","v1.6.4-rc0","v1.6.4-rc1","v1.6.4-rc2","v1.6.4-rc3","v1.6.5","v1.6.5-rc0","v1.6.5-rc1","v1.6.5-rc2","v1.6.5-rc3","v1.6.6","v1.6.6-rc0","v1.6.6-rc1","v1.6.6-rc2","v1.6.6-rc3","v1.6.6-rc4","v1.7.0","v1.7.0-rc0","v1.7.0-rc1","v1.7.0-rc2","v1.7.1","v1.7.1-rc0","v1.7.1-rc1","v1.7.1-rc2","v1.7.10","v1.7.10-rc0","v1.7.10-rc1","v1.7.10-rc2","v1.7.10-rc3","v1.7.10-rc4","v1.7.11","v1.7.11-rc0","v1.7.11-rc1","v1.7.11-rc2","v1.7.11-rc3","v1.7.12","v1.7.12-rc0","v1.7.12-rc1","v1.7.12-rc2","v1.7.12-rc3","v1.7.2","v1.7.2-rc0","v1.7.2-rc1","v1.7.2-rc2","v1.7.2-rc3","v1.7.3","v1.7.3-rc0","v1.7.3-rc1","v1.7.3-rc2","v1.7.3.1","v1.7.4","v1.7.4-rc0","v1.7.4-rc1","v1.7.4-rc2","v1.7.4-rc3","v1.7.5","v1.7.5-rc0","v1.7.5-rc1","v1.7.5-rc2","v1.7.5-rc3","v1.7.6","v1.7.6-rc0","v1.7.6-rc1","v1.7.6-rc2","v1.7.6-rc3","v1.7.7","v1.7.7-rc0","v1.7.7-rc1","v1.7.7-rc2","v1.7.7-rc3","v1.7.8","v1.7.8-rc0","v1.7.8-rc1","v1.7.8-rc2","v1.7.8-rc3","v1.7.8-rc4","v1.7.9","v1.7.9-rc0","v1.7.9-rc1","v1.7.9-rc2","v1.8.0","v1.8.0-rc0","v1.8.0-rc1","v1.8.0-rc2","v1.8.0-rc3","v1.8.1","v1.8.1-rc0","v1.8.1-rc1","v1.8.1-rc2","v1.8.1-rc3","v1.8.2","v1.8.2-rc0","v1.8.2-rc1","v1.8.2-rc2","v1.8.2-rc3","v1.8.3","v1.8.3-rc0","v1.8.3-rc1","v1.8.3-rc2","v1.8.3-rc3","v1.8.4","v1.8.4-rc0","v1.8.4-rc1","v1.8.4-rc2","v1.8.4-rc3","v1.8.4-rc4","v1.8.5","v1.8.5-rc0","v1.8.5-rc1","v1.8.5-rc2","v1.8.5-rc3","v1.9-rc0","v1.9-rc1","v1.9-rc2","v1.9.0","v1.9.0-rc3","v2.0.0","v2.0.0-rc0","v2.0.0-rc1","v2.0.0-rc2","v2.0.0-rc3","v2.0.0-rc4","v2.1.0","v2.1.0-rc0","v2.1.0-rc1","v2.1.0-rc2","v2.10.0","v2.10.0-rc0","v2.10.0-rc1","v2.10.0-rc2","v2.11.0","v2.11.0-rc0","v2.11.0-rc1","v2.11.0-rc2","v2.11.0-rc3","v2.12.0","v2.12.0-rc0","v2.12.0-rc1","v2.12.0-rc2","v2.13.0","v2.13.0-rc0","v2.13.0-rc1","v2.13.0-rc2","v2.14.0","v2.14.0-rc0","v2.14.0-rc1","v2.15.0","v2.15.0-rc0","v2.15.0-rc1","v2.15.0-rc2","v2.16.0","v2.16.0-rc0","v2.16.0-rc1","v2.16.0-rc2","v2.17.0","v2.17.0-rc0","v2.17.0-rc1","v2.17.0-rc2","v2.18.0","v2.18.0-rc0","v2.18.0-rc1","v2.18.0-rc2","v2.19.0","v2.19.0-rc0","v2.19.0-rc1","v2.19.0-rc2","v2.2.0","v2.2.0-rc0","v2.2.0-rc1","v2.2.0-rc2","v2.2.0-rc3","v2.20.0","v2.20.0-rc0","v2.20.0-rc1","v2.20.0-rc2","v2.21.0","v2.21.0-rc0","v2.21.0-rc1","v2.21.0-rc2","v2.22.0","v2.22.0-rc0","v2.22.0-rc1","v2.22.0-rc2","v2.22.0-rc3","v2.23.0","v2.23.0-rc0","v2.23.0-rc1","v2.23.0-rc2","v2.24.0","v2.24.0-rc0","v2.24.0-rc1","v2.24.0-rc2","v2.25.0","v2.25.0-rc0","v2.25.0-rc1","v2.25.0-rc2","v2.26.0","v2.26.0-rc0","v2.26.0-rc1","v2.26.0-rc2","v2.27.0","v2.27.0-rc0","v2.27.0-rc1","v2.27.0-rc2","v2.28.0","v2.28.0-rc0","v2.28.0-rc1","v2.28.0-rc2","v2.29.0","v2.29.0-rc0","v2.29.0-rc1","v2.29.0-rc2","v2.3.0","v2.3.0-rc0","v2.3.0-rc1","v2.3.0-rc2","v2.30.0","v2.30.0-rc0","v2.30.0-rc1","v2.30.0-rc2","v2.31.0","v2.31.0-rc0","v2.31.0-rc1","v2.31.0-rc2","v2.32.0","v2.32.0-rc0","v2.32.0-rc1","v2.32.0-rc2","v2.32.0-rc3","v2.33.0","v2.33.0-rc0","v2.33.0-rc1","v2.33.0-rc2","v2.34.0","v2.34.0-rc0","v2.34.0-rc1","v2.34.0-rc2","v2.35.0","v2.35.0-rc0","v2.35.0-rc1","v2.35.0-rc2","v2.36.0","v2.36.0-rc0","v2.36.0-rc1","v2.36.0-rc2","v2.37.0","v2.37.0-rc0","v2.37.0-rc1","v2.37.0-rc2","v2.38.0","v2.38.0-rc0","v2.38.0-rc1","v2.38.0-rc2","v2.39.0","v2.39.0-rc0","v2.39.0-rc1","v2.39.0-rc2","v2.39.1","v2.39.2","v2.39.3","v2.4.0","v2.4.0-rc0","v2.4.0-rc1","v2.4.0-rc2","v2.4.0-rc3","v2.40.0","v2.40.0-rc0","v2.40.0-rc1","v2.40.0-rc2","v2.40.1","v2.41.0","v2.41.0-rc0","v2.41.0-rc1","v2.41.0-rc2","v2.42.0","v2.42.0-rc0","v2.42.0-rc1","v2.42.0-rc2","v2.42.1","v2.43.0","v2.43.0-rc0","v2.43.0-rc1","v2.43.0-rc2","v2.43.1","v2.43.2","v2.43.3","v2.44.0","v2.44.0-rc0","v2.44.0-rc1","v2.44.0-rc2","v2.45.0","v2.45.0-rc0","v2.45.0-rc1","v2.5.0","v2.5.0-rc0","v2.5.0-rc1","v2.5.0-rc2","v2.5.0-rc3","v2.6.0","v2.6.0-rc0","v2.6.0-rc1","v2.6.0-rc2","v2.6.0-rc3","v2.7.0","v2.7.0-rc0","v2.7.0-rc1","v2.7.0-rc2","v2.7.0-rc3","v2.8.0","v2.8.0-rc0","v2.8.0-rc1","v2.8.0-rc2","v2.8.0-rc3","v2.8.0-rc4","v2.9.0","v2.9.0-rc0","v2.9.0-rc1","v2.9.0-rc2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-32002.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}]}