CVE-2024-35197 — Improper Handling of Windows Device Names in Gitoxide
Severity
5.4MEDIUMNVD
EPSS
0.0%
top 86.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 23
Latest updateAug 22
Description
gitoxide is a pure Rust implementation of Git. On Windows, fetching refs that clash with legacy device names reads from the devices, and checking out paths that clash with such names writes arbitrary data to the devices. This allows a repository, when cloned, to cause indefinite blocking or the production of arbitrary message that appear to have come from the application, and potentially other harmful effects under limited circumstances. If Windows is not used, or untrusted repositories are not …
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:LExploitability: 2.8 | Impact: 2.5
Affected Packages5 packages
🔴Vulnerability Details
6📋Vendor Advisories
1Debian▶
CVE-2024-35197: rust-gix-index - gitoxide is a pure Rust implementation of Git. On Windows, fetching refs that cl...↗2024