List Unix-like target OSes as affected by CVE-2025-22620 #2196
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This builds on #2193 by listing all Unix-like target operating systems as affected (since a category of OSes like "unix" cannot currently be represented in RUSTSEC advisory metadata).
The list was obtained by running the command given in #1911 (comment).
The vulnerability is specific to Unix-like operating systems because:
The vulnerable code runs only in the
unix
build configuration.0777 permissions are meaningful on such systems and (due to containing 0002) allow any user account on the system to write.
Therefore, if there are any Unix-like systems where Unix-style filesystem permissions are not used, or that are truly single user (i.e. do not use multiple user accounts, not even for running daemons with limited privileges), then this vulnerability would not affect such systems.
In addition, I have not attempted specifically to run the proof of concept for the vulnerability on most of the listed operating systems, nor examined whether
gix-worktree-state
might not be usable on some of them for reasons unrealted to this vulnerability.Conversely, if new target OSes are added in the future, and they are Unix-like, then they would probably be vulnerable, even though not listed here. (It may not be likely that anyone would be using an affected version of
gix-worktree-state
by that time, though.)