SB2025071892 - openEuler 22.03 LTS SP3 update for git
Published: July 18, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Protection Mechanism Failure (CVE-ID: CVE-2025-27613)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists in Gitk when cloning an untrusted repository and executing Gitk without additional command arguments. A remote attacker can abuse such behavior and overwrite or truncate any files on the system.
Successful exploitation of the vulnerability requires that the "Support per-file encoding" option is enabled.
2) Untrusted search path (CVE-ID: CVE-2025-46334)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to usage of an untrusted search path in Git GUI on Windows. A malicious repository can ship versions of sh.exe or typical textconv filter programs such as astextplain. On Windows, path lookup can find such executables in the worktree. These programs are invoked when the user selects "Git Bash" or "Browse Files" from the menu.
Note, the vulnerability affects Windows installations only.
3) Product UI does not warn user of unsafe actions (CVE-ID: CVE-2025-46835)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to missing notifications in Git GUI when performing potentially dangerous actions. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory in the repository, then Git GUI can create and overwrite any writable file.
Remediation
Install update from vendor's website.