CVE-2025-31130

gitoxide is an implementation of git written in Rust. Before 0.42.0, gitoxide uses SHA-1 hash implementations without any collision detection, leaving it vulnerable to hash collision attacks. gitoxide uses the sha1_smol or sha1 crate, both of which implement standard SHA-1 without any mitigations for collision attacks. This means that two distinct Git objects with colliding SHA-1 hashes would break the Git object model and integrity checks when used with gitoxide. This vulnerability is fixed in 0.42.0.
Configurations

No configuration.

History

23 Jan 2026, 18:16

Type Values Removed Values Added
References
  • {'url': 'https://github.com/GitoxideLabs/gitoxide/commit/4660f7a6f71873311f68f170b0f1f6659a02829d', 'source': 'security-advisories@github.com'}
  • () https://github.com/GitoxideLabs/gitoxide/commit/f253f02a6658b3b7612a50d56c71f5ae4da4ca21 -

07 Apr 2025, 14:18

Type Values Removed Values Added
Summary
  • (es) Gitoxide es una implementación de Git escrita en Rust. Antes de la versión 0.42.0, Gitoxide utilizaba implementaciones de hash SHA-1 sin detección de colisiones, lo que lo hacía vulnerable a ataques de colisión de hash. Gitoxide utiliza la caja sha1_smol o sha1, que implementan SHA-1 estándar sin mitigaciones para ataques de colisión. Esto significa que dos objetos Git distintos con hashes SHA-1 en colisión interrumpirían el modelo de objetos Git y las comprobaciones de integridad al usarse con Gitoxide. Esta vulnerabilidad se corrigió en la versión 0.42.0.

04 Apr 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-04 15:15

Updated : 2026-01-23 18:16


NVD link : CVE-2025-31130

Mitre link : CVE-2025-31130

CVE.ORG link : CVE-2025-31130


JSON object : View

Products Affected

No product.

CWE
CWE-328

Use of Weak Hash