Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2025-26625

Опубликовано: 17 окт. 2025
Источник: ubuntu
Приоритет: medium
EPSS Низкий

Описание

Git LFS is a Git extension for versioning large files. In Git LFS versions 0.5.2 through 3.7.0, when populating a Git repository's working tree with the contents of Git LFS objects, certain Git LFS commands may write to files visible outside the current Git working tree if symbolic or hard links exist which collide with the paths of files tracked by Git LFS. The git lfs checkout and git lfs pull commands do not check for symbolic links before writing to files in the working tree, allowing an attacker to craft a repository containing symbolic or hard links that cause Git LFS to write to arbitrary file system locations accessible to the user running these commands. As well, when the git lfs checkout and git lfs pull commands are run in a bare repository, they could write to files visible outside the repository. The vulnerability is fixed in version 3.7.1. As a workaround, support for symlinks in Git may be disabled by setting the core.symlinks configuration option to false, after whic...

РелизСтатусПримечание
devel

not-affected

3.7.1-1
esm-apps/bionic

ignored

changes too intrusive
esm-apps/focal

ignored

changes too intrusive
esm-apps/jammy

ignored

changes too intrusive
esm-apps/noble

released

3.4.1-1ubuntu0.3+esm2
jammy

ignored

changes too intrusive
noble

needed

plucky

ignored

end of life, was needed
questing

released

3.6.1-1ubuntu0.1
upstream

released

3.7.1

Показывать по

EPSS

Процентиль: 8%
0.00029
Низкий

Связанные уязвимости

nvd
4 месяца назад

Git LFS is a Git extension for versioning large files. In Git LFS versions 0.5.2 through 3.7.0, when populating a Git repository's working tree with the contents of Git LFS objects, certain Git LFS commands may write to files visible outside the current Git working tree if symbolic or hard links exist which collide with the paths of files tracked by Git LFS. The git lfs checkout and git lfs pull commands do not check for symbolic links before writing to files in the working tree, allowing an attacker to craft a repository containing symbolic or hard links that cause Git LFS to write to arbitrary file system locations accessible to the user running these commands. As well, when the git lfs checkout and git lfs pull commands are run in a bare repository, they could write to files visible outside the repository. The vulnerability is fixed in version 3.7.1. As a workaround, support for symlinks in Git may be disabled by setting the core.symlinks configuration option to false, after which f

debian
4 месяца назад

Git LFS is a Git extension for versioning large files. In Git LFS vers ...

rocky
около 2 месяцев назад

Important: git-lfs security update

rocky
около 2 месяцев назад

Important: git-lfs security update

rocky
около 2 месяцев назад

Important: git-lfs security update

EPSS

Процентиль: 8%
0.00029
Низкий