Description

gitoxide is a pure Rust implementation of Git. On Windows, fetching refs that clash with legacy device names reads from the devices, and checking out paths that clash with such names writes arbitrary data to the devices. This allows a repository, when cloned, to cause indefinite blocking or the production of arbitrary message that appear to have come from the application, and potentially other harmful effects under limited circumstances. If Windows is not used, or untrusted repositories are not cloned or otherwise used, then there is no impact. A minor degradation in availability may also be possible, such as with a very large file named `CON`, though the user could interrupt the application.

INFO

Published Date :

2024-05-23T12:09:09.044Z

Last Modified :

2024-08-02T03:07:46.729Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2024-35197 vulnerability.

Vendors Products
Byron
  • Gitoxide
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2024-35197.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact