Import Source
https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-55670.json
JSON Data
https://api.test.osv.dev/v1/vulns/AZL-55670
Upstream
Published
2025-01-14T20:15:28Z
Modified
2026-04-01T05:18:42.754376Z
Summary
CVE-2024-53263 affecting package git-lfs for versions less than 3.6.1-1
Details

Git LFS is a Git extension for versioning large files. When Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the git-credential(1) command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials. This problem exists in all previous versions and is patched in v3.6.1. All users should upgrade to v3.6.1. There are no workarounds known at this time.

References

Affected packages

Azure Linux:3 / git-lfs

Package

Name
git-lfs
Purl
pkg:rpm/azure-linux/git-lfs

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.1-1

Database specific

source
"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-55670.json"