Source: git-lfs
Version: 3.5.0-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Control: found -1 3.3.0-1
Control: found -1 2.13.2-1

Hi,

The following vulnerability was published for git-lfs.

CVE-2024-53263[0]:
| Git LFS is a Git extension for versioning large files. When Git LFS
| requests credentials from Git for a remote host, it passes portions
| of the host's URL to the `git-credential(1)` command without
| checking for embedded line-ending control characters, and then sends
| any credentials it receives back from the Git credential helper to
| the remote host. By inserting URL-encoded control characters such as
| line feed (LF) or carriage return (CR) characters into the URL, an
| attacker may be able to retrieve a user's Git credentials. This
| problem exists in all previous versions and is patched in v3.6.1.
| All users should upgrade to v3.6.1. There are no workarounds known
| at this time.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-53263
    https://www.cve.org/CVERecord?id=CVE-2024-53263
[1] https://github.com/git-lfs/git-lfs/security/advisories/GHSA-q6r2-x2cc-vrp7
[2] 
https://github.com/git-lfs/git-lfs/commit/0345b6f816e611d050c0df67b61f0022916a1c90

Regards,
Salvatore

Reply via email to