CVE-2024-32021

Local Git clone may hardlink arbitrary user-readable files into the new repository's "objects/" directory

Git is a revision control system. Prior to versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4, when cloning a local source repository that contains symlinks via the filesystem, Git may create hardlinks to arbitrary user-readable files on the same filesystem as the target repository in the `objects/` directory. Cloning a local repository over the filesystem may creating hardlinks to arbitrary user-owned files on the same filesystem in the target Git repository's `objects/` directory. When cloning a repository over the filesystem (without explicitly specifying the `file://` protocol or `--no-local`), the optimizations for local cloning will be used, which include attempting to hard link the object files instead of copying them. While the code includes checks against symbolic links in the source repository, which were added during the fix for CVE-2022-39253, these checks can still be raced because the hard link operation ultimately follows symlinks. If the object on the filesystem appears as a file during the check, and then a symlink during the operation, this will allow the adversary to bypass the check and create hardlinks in the destination objects directory to arbitrary, user-readable files. The problem has been patched in versions 2.45.1, 2.44.1, 2.43.4, 2.42.2, 2.41.1, 2.40.2, and 2.39.4.


We have discovered 346 live websites that are affected by CVE-2024-32021.

Run a Free Instant Scan




Affected Software

Product  git
Category Dev Tools
Vulnerable Domains346 live websites (57% of git install base)
Vulnerable Versions
  • from 0 through 2.39.4
  • from 2.40 through 2.40.2
  • from 2.41 through 2.41.1
  • from 2.42 through 2.42.2
  • from 2.43 through 2.43.4
  • from 2.44 through 2.44.1
  • from 2.45 through 2.45.1
Vulnerable Versions Count22 versions ( 56% of all versions)


Common Weakness Enumeration

CWE-547 Use of Hard-coded, Security-relevant Constants



Details

  • Published - May 14, 2024
  • Updated - Nov 4, 2025

Website Distribution by Country

Number of websites using CVE-2024-32021
United States98 websites



Germany100 websites
France43 websites
Singapore26 websites
GB14 websites
Netherlands6 websites
Switzerland6 websites
Australia5 websites
Sweden5 websites
Denmark5 websites

Website Distribution by TLD

Number of websites using CVE-2024-32021
.org118 websites
.com55 websites
.net42 websites
.de38 websites
.fr8 websites
.at4 websites
.io4 websites
.ch4 websites
.info4 websites
.org.uk4 websites

Vulnerable Versions

Vulnerable versions are highlighted in red

Websites affected by CVE-2024-32021

Top websites that are affected by CVE-2024-32021. Please click on the "Contact us" link to get more information.
DomainCountryRankContacts
****.***********.org United States**,***
***.******.org United States**,***
****.**.cz Germany**,***
***.********.org France**,***
****.**.io Finland***,***
***.********.org United States***,***
***.*****.org Germany***,***
*******.org France***,***
***.*****.com United States***,***
***.*******.org United States***,***
See full domain list

FAQ

CVE-2024-32021 is Use of Hard-coded, Security-relevant Constants in git
A total of 346 websites have been identified as vulnerable to CVE-2024-32021, based on global website indexing conducted by WebTechSurvey.
The git is affected by the CVE-2024-32021 vulnerability.
git versions up to 2.45.1 are vulnerable to CVE-2024-32021.
CVE-2024-32021 is resolved in version 2.45.1 of git.