{"id":"CVE-2024-37904","summary":"Denial of service from maliciously configured Git repository in Minder","details":"Minder is an open source Software Supply Chain Security Platform. Minder's Git provider is vulnerable to a denial of service from a maliciously configured GitHub repository. The Git provider clones users repositories using the `github.com/go-git/go-git/v5` library on lines `L55-L89`. The Git provider does the following on the lines `L56-L62`. First, it sets the `CloneOptions`, specifying the url, the depth etc. It then validates the options. It then sets up an in-memory filesystem, to which it clones and Finally, it clones the repository. The `(g *Git) Clone()` method is vulnerable to a DoS attack: A Minder user can instruct Minder to clone a large repository which will exhaust memory and crash the Minder server. The root cause of this vulnerability is a combination of the following conditions: 1. Users can control the Git URL which Minder clones, 2. Minder does not enforce a size limit to the repository, 3. Minder clones the entire repository into memory. This issue has been addressed in commit `7979b43` which has been included in release version v0.0.52. Users are advised to upgrade. There are no known workarounds for this vulnerability.","aliases":["GHSA-hpcg-xjq5-g666","GO-2024-2934"],"modified":"2026-04-10T05:14:17.696911Z","published":"2024-06-18T17:07:02.812Z","database_specific":{"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/37xxx/CVE-2024-37904.json","cwe_ids":["CWE-400"]},"references":[{"type":"WEB","url":"https://github.com/stacklok/minder/blob/85985445c8ac3e51f03372e99c7b2f08a6d274aa/internal/providers/git/git.go#L55-L89"},{"type":"WEB","url":"https://github.com/stacklok/minder/blob/85985445c8ac3e51f03372e99c7b2f08a6d274aa/internal/providers/git/git.go#L56-L62"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/37xxx/CVE-2024-37904.json"},{"type":"ADVISORY","url":"https://github.com/stacklok/minder/security/advisories/GHSA-hpcg-xjq5-g666"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-37904"},{"type":"FIX","url":"https://github.com/stacklok/minder/commit/7979b43"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mindersec/minder","events":[{"introduced":"0"},{"fixed":"7979b43"}]},{"type":"GIT","repo":"https://github.com/mindersec/minder","events":[{"introduced":"0"},{"fixed":"7979b43"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-37904.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/stacklok/minder","events":[{"introduced":"0"},{"fixed":"328e2a163c66d525733af3bff44e8e9a873faba6"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"0.0.52"}]}}],"versions":["v0.0.1","v0.0.10","v0.0.11","v0.0.12","v0.0.13","v0.0.14","v0.0.15","v0.0.16","v0.0.17","v0.0.18","v0.0.19","v0.0.2","v0.0.20","v0.0.21","v0.0.22","v0.0.23","v0.0.24","v0.0.25","v0.0.26","v0.0.27","v0.0.28","v0.0.29","v0.0.3","v0.0.30","v0.0.31","v0.0.32","v0.0.33","v0.0.34","v0.0.35","v0.0.36","v0.0.37","v0.0.38","v0.0.39","v0.0.4","v0.0.40","v0.0.41","v0.0.42","v0.0.43","v0.0.44","v0.0.45","v0.0.46","v0.0.47","v0.0.48","v0.0.49","v0.0.5","v0.0.50","v0.0.51","v0.0.6","v0.0.7","v0.0.8","v0.0.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-37904.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}]}