PT-2025-28848 · Git +9 · Git +9
Avih
·
Published
2025-01-01
·
Updated
2025-08-07
·
CVE-2025-27613
3.6
Low
Base vector | Vector | AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N |
Name of the Vulnerable Software and Affected Versions:
Git versions 2.43.7 through 2.49.1
Description:
The issue allows for the creation and truncation of any writable file when a user clones an untrusted repository and runs Gitk without additional command arguments, provided the "Support per-file encoding" option is enabled. Additionally, the operation "Show origin of this line" is affected, regardless of the option being enabled or not. Multiple vulnerabilities were fixed in Git, including arbitrary code execution and buffer overflows.
Recommendations:
For Git versions 2.43.7 through 2.49.1, update to a version newer than 2.49.1 to resolve the issue.
As a temporary workaround, consider disabling the "Support per-file encoding" option and restricting the use of Gitk until a patch is available.
Avoid using the "Show origin of this line" operation in Gitk for untrusted repositories until the issue is resolved.
Fix
OS Command Injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 89
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52006 · Security Note
- https://linux.oracle.com/errata/ELSA-2025-11534.html · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48386 · Security Note
- https://bdu.fstec.ru/vul/2025-09361 · Security Note
- https://ubuntu.com/security/notices/USN-7626-3 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-46835 · Vendor Advisory
- https://ubuntu.com/security/notices/USN-7626-1 · Vendor Advisory
- https://osv.dev/vulnerability/USN-7626-3 · Vendor Advisory
- https://osv.dev/vulnerability/ALSA-2025:11462 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-48385 · Vendor Advisory
- https://errata.almalinux.org/9/ALSA-2025-11462.html · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48385 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46835 · Security Note
- https://bdu.fstec.ru/vul/2025-09363 · Security Note
- https://ubuntu.com/security/CVE-2025-27614 · Vendor Advisory