DEBIAN-CVE-2025-46835

Source
https://security-tracker.debian.org/tracker/CVE-2025-46835
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-46835.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2025-46835
Upstream
Published
2025-07-10T15:15:29Z
Modified
2025-09-19T07:34:43.647572Z
Summary
[none]
Details

Git GUI allows you to use the Git source control management tools via a GUI. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory in the repository, then Git GUI can create and overwrite files for which the user has write permission. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.

References

Affected packages

Debian:13 / git

Package

Name
git
Purl
pkg:deb/debian/git?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.47.3-0+deb13u1

Affected versions

1:2.*

1:2.47.2-0.2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / git

Package

Name
git
Purl
pkg:deb/debian/git?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:2.50.1-0.1

Affected versions

1:2.*

1:2.47.2-0.2
1:2.48.0~rc1+next.20250101-1
1:2.49.0-1
1:2.49.0-2
1:2.49.0-3
1:2.49.0+next.20250314-1
1:2.50.0~rc0+next.20250528-1
1:2.50.0-1
1:2.50.0+next.20250615-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}