[CLSA-2025:1754940060] Fix CVE(s): CVE-2025-27613, CVE-2025-27614, CVE-2025-46835
Type:
security
Severity:
Moderate
Release date:
2025-08-11 19:21:04 UTC
Description:
* SECURITY UPDATE: multiple vulnerabilities in Gitk and Git GUI - debian/patches/CVE-2025-27614_CVE-2025-27613_CVE-2025-46835.patch: Prevent script execution via specially crafted filenames in Gitk. Sanitize filename handling to avoid unintended file creation/truncation. Validate directory names in Git GUI to prevent unsafe file overwrites when editing files - CVE-2025-27614, CVE-2025-27613, CVE-2025-46835
Updated packages:
  • git_2.17.1-1ubuntu0.18+tuxcare.els7_amd64.deb
    sha:3eccd6f64f15bdaab3137bcbaa048e96d708db02
  • git-all_2.17.1-1ubuntu0.18+tuxcare.els7_all.deb
    sha:a36f42b9d2b830fff40aea0fa1178d3487e9af08
  • git-cvs_2.17.1-1ubuntu0.18+tuxcare.els7_all.deb
    sha:1497e463259366d86fc5aa66b3332db893582353
  • git-daemon-run_2.17.1-1ubuntu0.18+tuxcare.els7_all.deb
    sha:3013713f2b425cefaff83e2002e2e03028ba88ca
  • git-daemon-sysvinit_2.17.1-1ubuntu0.18+tuxcare.els7_all.deb
    sha:2052f74803dc074490c8367df72c08d1e4700df4
  • git-doc_2.17.1-1ubuntu0.18+tuxcare.els7_all.deb
    sha:ec29f9e1034482caf0443725e6ba7f00752014f6
  • git-el_2.17.1-1ubuntu0.18+tuxcare.els7_all.deb
    sha:c36a7b4046122d5e1a4256172cc1eedeb0104f9c
  • git-email_2.17.1-1ubuntu0.18+tuxcare.els7_all.deb
    sha:5e92066d91f5321c5b7a791c7dcf3577cb5a76b9
  • git-gui_2.17.1-1ubuntu0.18+tuxcare.els7_all.deb
    sha:ca168e23161c964ced2e702ed46fc68f8dd30e3c
  • git-man_2.17.1-1ubuntu0.18+tuxcare.els7_all.deb
    sha:6ebcfe2eecc83105a183bf1f39431ad373a0e296
  • git-mediawiki_2.17.1-1ubuntu0.18+tuxcare.els7_all.deb
    sha:23a24bb6de01d15193a7649a1c53942b2aaf288d
  • git-svn_2.17.1-1ubuntu0.18+tuxcare.els7_all.deb
    sha:b2e99c898fc69c74d1ca859d84017085dea1d1b9
  • gitk_2.17.1-1ubuntu0.18+tuxcare.els7_all.deb
    sha:c777e746c3f8a9bdd9785e512cd06eb3434d5cf0
  • gitweb_2.17.1-1ubuntu0.18+tuxcare.els7_all.deb
    sha:ca3eb60fb140a8980f21de753fdf0d8a9966a5f4
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.