openEuler 22.03 LTS SP3 update for git



Risk High
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2025-27613
CVE-2025-46334
CVE-2025-46835
CWE-ID CWE-693
CWE-426
CWE-356
Exploitation vector Network
Public exploit N/A
Vulnerable software
openEuler
Operating systems & Components / Operating system

perl-Git-SVN
Operating systems & Components / Operating system package or component

perl-Git
Operating systems & Components / Operating system package or component

gitk
Operating systems & Components / Operating system package or component

git-web
Operating systems & Components / Operating system package or component

git-svn
Operating systems & Components / Operating system package or component

git-help
Operating systems & Components / Operating system package or component

git-gui
Operating systems & Components / Operating system package or component

git-email
Operating systems & Components / Operating system package or component

git-debugsource
Operating systems & Components / Operating system package or component

git-debuginfo
Operating systems & Components / Operating system package or component

git-daemon
Operating systems & Components / Operating system package or component

git-core
Operating systems & Components / Operating system package or component

git
Operating systems & Components / Operating system package or component

Vendor openEuler

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Protection Mechanism Failure

EUVDB-ID: #VU112642

Risk: High

CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-27613

CWE-ID: CWE-693 - Protection Mechanism Failure

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists in Gitk when cloning an untrusted repository and executing Gitk without additional command arguments. A remote attacker can abuse such behavior and overwrite or truncate any files on the system. 

Successful exploitation of the vulnerability requires that the "Support per-file encoding" option is enabled. 

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

perl-Git-SVN: before 2.33.0-19

perl-Git: before 2.33.0-19

gitk: before 2.33.0-19

git-web: before 2.33.0-19

git-svn: before 2.33.0-19

git-help: before 2.33.0-19

git-gui: before 2.33.0-19

git-email: before 2.33.0-19

git-debugsource: before 2.33.0-19

git-debuginfo: before 2.33.0-19

git-daemon: before 2.33.0-19

git-core: before 2.33.0-19

git: before 2.33.0-19

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1849


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Untrusted search path

EUVDB-ID: #VU112644

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-46334

CWE-ID: CWE-426 - Untrusted Search Path

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to usage of an untrusted search path in Git GUI on Windows. A malicious repository can ship versions of sh.exe or typical textconv filter programs such as astextplain. On Windows, path lookup can find such executables in the worktree. These programs are invoked when the user selects "Git Bash" or "Browse Files" from the menu.

Note, the vulnerability affects Windows installations only. 

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

perl-Git-SVN: before 2.33.0-19

perl-Git: before 2.33.0-19

gitk: before 2.33.0-19

git-web: before 2.33.0-19

git-svn: before 2.33.0-19

git-help: before 2.33.0-19

git-gui: before 2.33.0-19

git-email: before 2.33.0-19

git-debugsource: before 2.33.0-19

git-debuginfo: before 2.33.0-19

git-daemon: before 2.33.0-19

git-core: before 2.33.0-19

git: before 2.33.0-19

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1849


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Product UI does not warn user of unsafe actions

EUVDB-ID: #VU112646

Risk: Medium

CVSSv4.0: 4.5 [CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2025-46835

CWE-ID: CWE-356 - Product UI does not Warn User of Unsafe Actions

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to missing notifications in Git GUI when performing potentially dangerous actions. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory in the repository, then Git GUI can create and overwrite any writable file.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

openEuler: 22.03 LTS SP3

perl-Git-SVN: before 2.33.0-19

perl-Git: before 2.33.0-19

gitk: before 2.33.0-19

git-web: before 2.33.0-19

git-svn: before 2.33.0-19

git-help: before 2.33.0-19

git-gui: before 2.33.0-19

git-email: before 2.33.0-19

git-debugsource: before 2.33.0-19

git-debuginfo: before 2.33.0-19

git-daemon: before 2.33.0-19

git-core: before 2.33.0-19

git: before 2.33.0-19

CPE2.3 External links

https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1849


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###