{"id":"AZL-55670","summary":"CVE-2024-53263 affecting package git-lfs for versions less than 3.6.1-1","details":"Git LFS is a Git extension for versioning large files. When Git LFS requests credentials from Git for a remote host, it passes portions of the host's URL to the `git-credential(1)` command without checking for embedded line-ending control characters, and then sends any credentials it receives back from the Git credential helper to the remote host. By inserting URL-encoded control characters such as line feed (LF) or carriage return (CR) characters into the URL, an attacker may be able to retrieve a user's Git credentials. This problem exists in all previous versions and is patched in v3.6.1. All users should upgrade to v3.6.1. There are no workarounds known at this time.","modified":"2026-04-01T05:18:42.754376Z","published":"2025-01-14T20:15:28Z","upstream":["CVE-2024-53263"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-53263"}],"affected":[{"package":{"name":"git-lfs","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/git-lfs"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.6.1-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-55670.json"}}],"schema_version":"1.7.5"}