GHSA-6pvw-g552-53c5

Suggest an improvement
Source
https://github.com/advisories/GHSA-6pvw-g552-53c5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-6pvw-g552-53c5/GHSA-6pvw-g552-53c5.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-6pvw-g552-53c5
Aliases
Published
2025-10-17T17:05:03Z
Modified
2025-11-05T19:58:35.784414Z
Severity
  • 8.6 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Git LFS may write to arbitrary files via crafted symlinks
Details

Impact

When populating a Git repository's working tree with the contents of Git LFS objects, certain Git LFS commands may write to files visible outside the current Git working tree if symbolic or hard links exist which collide with the paths of files tracked by Git LFS.

Git LFS has resolved this problem by revising the git lfs checkout and git lfs pull commands so that they check for symbolic links in the same manner as performed by Git before writing to files in the working tree. These commands now also remove existing files in the working tree before writing new files in their place.

As well, Git LFS has resolved a problem whereby the git lfs checkout and git lfs pull commands, when run in a bare repository, could write to files visible outside the repository. While a specific and relatively unlikely set of conditions were required for this to occur, it is no longer possible under any circumstances.

Patches

This problem exists in all versions since 0.5.2 and is patched in v3.7.1. All users should upgrade to v3.7.1.

Workarounds

Support for symlinks in Git may be disabled by setting the core.symlinks configuration option to false, after which further clones and fetches will not create symbolic links. However, any symbolic or hard links in existing repositories will still provide the opportunity for Git LFS to write to their targets.

References

For more information

If there are any questions or comments about this advisory: * For general questions, start a discussion in the Git LFS discussion forum. * For reports of additional vulnerabilities, please follow the Git LFS security reporting policy.

Database specific
{
    "nvd_published_at": "2025-10-17T16:15:37Z",
    "cwe_ids": [
        "CWE-59"
    ],
    "severity": "HIGH",
    "github_reviewed_at": "2025-10-17T17:05:03Z",
    "github_reviewed": true
}
References

Affected packages

Go / github.com/git-lfs/git-lfs

Package

Name
github.com/git-lfs/git-lfs
View open source insights on deps.dev
Purl
pkg:golang/github.com/git-lfs/git-lfs

Affected ranges

Type
SEMVER
Events
Introduced
0.5.2
Fixed
3.7.1

Database specific

source

"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/10/GHSA-6pvw-g552-53c5/GHSA-6pvw-g552-53c5.json"

last_known_affected_version_range

"<= 3.7.0"