Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/git-lfs@0?distro=trixie
purl pkg:deb/debian/git-lfs@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-9dw1-pfyv-67hq Git LFS can execute a Git binary from the current directory ### Impact On Windows, if Git LFS operates on a malicious repository with a `git.bat` or `git.exe` file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. This occurs because on Windows, Go includes (and prefers) the current directory when the name of a command run does not contain a directory separator. ### Patches This version should be patched in v2.12.1, which will be released in coordination with this security advisory. ### Workarounds Other than avoiding untrusted repositories, there is no workaround. ### For more information If you have any questions or comments about this advisory: * Start a discussion in [the Git LFS discussion page](https://github.com/git-lfs/git-lfs/discussions). * If you cannot open a discussion, please email the core team using their usernames at `github.com`. CVE-2020-27955
GHSA-4g4p-42wc-9f3m
VCID-cnnc-st29-t3eh GitHub Git LFS Arbitrary command execution vulnerability GitHub Git LFS before 2.1.1 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, located on a `url =` line in a `.lfsconfig` file within a repository. ### Specific Go Packages Affected github.com/git-lfs/git-lfs/lfsapi CVE-2017-17831
GHSA-w4xh-w33p-4v29
VCID-ej86-jpcj-hqav Git LFS can execute a Git binary from the current directory on Windows ### Impact On Windows, if Git LFS operates on a malicious repository with a git.bat or git.exe file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. This is the result of an incomplete fix for CVE-2020-27955. This issue occurs because on Windows, [Go includes (and prefers) the current directory when the name of a command run does not contain a directory separator](https://github.com/golang/go/issues/38736). ### Patches This version should be patched in v2.13.2, which will be released in coordination with this security advisory. ### Workarounds Other than avoiding untrusted repositories or using a different operating system, there is no workaround. ### References _Are there any links users can visit to find out more?_ ### For more information If you have any questions or comments about this advisory: - Start a discussion in [the Git LFS discussion page](https://github.com/git-lfs/git-lfs/discussions). - If you cannot open a discussion, please email the core team using their usernames at `github.com`. CVE-2021-21237
GHSA-cx3w-xqmc-84g5

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:00:32.120150+00:00 Debian Importer Fixing VCID-9dw1-pfyv-67hq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:01:33.731833+00:00 Debian Importer Fixing VCID-cnnc-st29-t3eh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:12:37.997847+00:00 Debian Importer Fixing VCID-ej86-jpcj-hqav https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:56:21.549047+00:00 Debian Importer Fixing VCID-9dw1-pfyv-67hq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:52.310374+00:00 Debian Importer Fixing VCID-cnnc-st29-t3eh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:51:52.590829+00:00 Debian Importer Fixing VCID-ej86-jpcj-hqav https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:24:46.473424+00:00 Debian Importer Fixing VCID-ej86-jpcj-hqav https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:24:46.433609+00:00 Debian Importer Fixing VCID-9dw1-pfyv-67hq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:24:46.389467+00:00 Debian Importer Fixing VCID-cnnc-st29-t3eh https://security-tracker.debian.org/tracker/data/json 38.1.0