CVE-2025-46835
Publication date 8 July 2025
Last updated 10 July 2025
Ubuntu priority
Cvss 3 Severity Score
Git GUI allows you to use the Git source control management tools via a GUI. When a user clones an untrusted repository and is tricked into editing a file located in a maliciously named directory in the repository, then Git GUI can create and overwrite files for which the user has write permission. This vulnerability is fixed in 2.43.7, 2.44.4, 2.45.4, 2.46.4, 2.47.3, 2.48.2, 2.49.1, and 2.50.1.
Status
Package | Ubuntu Release | Status |
---|---|---|
git | 25.04 plucky |
Fixed 1:2.48.1-0ubuntu1.1
|
24.04 LTS noble |
Fixed 1:2.43.0-1ubuntu7.3
|
|
22.04 LTS jammy |
Fixed 1:2.34.1-1ubuntu1.15
|
|
20.04 LTS focal |
Fixed 1:2.25.1-1ubuntu3.14+esm3
|
|
18.04 LTS bionic |
Fixed 1:2.17.1-1ubuntu0.18+esm4
|
|
16.04 LTS xenial |
Fixed 1:2.7.4-0ubuntu1.10+esm11
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProSeverity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | High |
Integrity impact | High |
Availability impact | Low |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L |
References
Related Ubuntu Security Notices (USN)
- USN-7626-1
- Git vulnerabilities
- 8 July 2025