CVE-2024-35197

May 23, 2024, 1:15 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

gitoxide

Source

security-advisories@github.com

Tags

CVE-2024-35197 details

Published : May 23, 2024, 1:15 p.m.
Last Modified : May 23, 2024, 1:15 p.m.

Description

gitoxide is a pure Rust implementation of Git. On Windows, fetching refs that clash with legacy device names reads from the devices, and checking out paths that clash with such names writes arbitrary data to the devices. This allows a repository, when cloned, to cause indefinite blocking or the production of arbitrary message that appear to have come from the application, and potentially other harmful effects under limited circumstances. If Windows is not used, or untrusted repositories are not cloned or otherwise used, then there is no impact. A minor degradation in availability may also be possible, such as with a very large file named `CON`, though the user could interrupt the application.

CVSS Score

1 2 3 4 5.4 6 7 8 9 10

Weakness

Weakness Name Description

CVSS Data

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

LOW

Base Score

5.4

Exploitability Score

Impact Score

Base Severity

MEDIUM

References

URL Source
https://github.com/Byron/gitoxide/security/advisories/GHSA-49jc-r788-3fc9 security-advisories@github.com
This website uses the NVD API, but is not approved or certified by it.