VYPR
Medium severity5.4NVD Advisory· Published May 23, 2024· Updated Apr 15, 2026

CVE-2024-35197

CVE-2024-35197

Description

gitoxide is a pure Rust implementation of Git. On Windows, fetching refs that clash with legacy device names reads from the devices, and checking out paths that clash with such names writes arbitrary data to the devices. This allows a repository, when cloned, to cause indefinite blocking or the production of arbitrary message that appear to have come from the application, and potentially other harmful effects under limited circumstances. If Windows is not used, or untrusted repositories are not cloned or otherwise used, then there is no impact. A minor degradation in availability may also be possible, such as with a very large file named CON, though the user could interrupt the application.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
gix-worktree-statecrates.io
< 0.11.00.11.0
gitoxidecrates.io
< 0.36.00.36.0
gix-worktreecrates.io
< 0.34.00.34.0
gitoxide-corecrates.io
< 0.38.00.38.0
gixcrates.io
< 0.63.00.63.0
gix-refcrates.io
< 0.44.00.44.0
gix-indexcrates.io
< 0.33.00.33.0

Patches

1

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.