Name | CVE-2017-17831 |
Description | GitHub Git LFS before 2.1.1 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, located on a "url =" line in a .lfsconfig file within a repository. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
git-lfs (PTS) | bullseye | 2.13.2-1 | fixed |
| bookworm | 3.3.0-1 | fixed |
| sid, trixie | 3.5.0-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
git-lfs | source | (unstable) | (not affected) | | | |
Notes
- git-lfs <not-affected> (Fixed before initial upload to Debian)
https://github.com/git-lfs/git-lfs/pull/2242
https://github.com/git-lfs/git-lfs/releases/tag/v2.1.1