Debian Package Tracker
Register | Log in
Subscribe

llm

CLI utility and Python library for interacting with Large Language Models

Choose email to subscribe with

general
  • source: llm (main)
  • version: 0.30-1
  • maintainer: Debian Python Team (DMD)
  • uploaders: Antoine Beaupré [DMD]
  • arch: all
  • std-ver: 4.6.2.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • stable: 0.23-1
  • testing: 0.30-1
  • unstable: 0.30-1
versioned links
  • 0.23-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 0.30-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • llm (1 bugs: 0, 1, 0, 0)
action needed
A new upstream version is available: 0.31 high
A new upstream version 0.31 is available, you should consider packaging it.
Created: 2026-04-28 Last update: 2026-05-18 20:00
1 security issue in trixie high

There is 1 open security issue in trixie.

1 important issue:
  • CVE-2026-31236: The llm CLI tool thru 0.27.1 contains a critical code injection vulnerability via its --functions command-line argument. This argument is intended to allow users to provide custom Python function definitions. However, the tool directly executes the provided code using the unsafe exec() function without any sanitization, sandboxing, or security restrictions. An attacker can exploit this by crafting a malicious llm command with arbitrary Python code in the --functions argument and using social engineering to trick a victim into running it. This leads to arbitrary code execution on the victim's system, potentially granting the attacker full control.
Created: 2026-05-17 Last update: 2026-05-17 15:03
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-31236: The llm CLI tool thru 0.27.1 contains a critical code injection vulnerability via its --functions command-line argument. This argument is intended to allow users to provide custom Python function definitions. However, the tool directly executes the provided code using the unsafe exec() function without any sanitization, sandboxing, or security restrictions. An attacker can exploit this by crafting a malicious llm command with arbitrary Python code in the --functions argument and using social engineering to trick a victim into running it. This leads to arbitrary code execution on the victim's system, potentially granting the attacker full control.
Created: 2026-05-17 Last update: 2026-05-17 15:03
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-31236: The llm CLI tool thru 0.27.1 contains a critical code injection vulnerability via its --functions command-line argument. This argument is intended to allow users to provide custom Python function definitions. However, the tool directly executes the provided code using the unsafe exec() function without any sanitization, sandboxing, or security restrictions. An attacker can exploit this by crafting a malicious llm command with arbitrary Python code in the --functions argument and using social engineering to trick a victim into running it. This leads to arbitrary code execution on the victim's system, potentially granting the attacker full control.
Created: 2026-05-17 Last update: 2026-05-17 15:03
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2026-04-08 Last update: 2026-04-08 08:31
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.6.2.0).
Created: 2024-10-16 Last update: 2026-04-08 06:00
news
[rss feed]
  • [2026-04-10] llm 0.30-1 MIGRATED to testing (Debian testing watch)
  • [2026-04-07] Accepted llm 0.30-1 (source) into unstable (Antoine Beaupré)
  • [2026-03-22] llm 0.29-1 MIGRATED to testing (Debian testing watch)
  • [2026-03-19] Accepted llm 0.29-1 (source) into unstable (Antoine Beaupré)
  • [2026-02-22] llm 0.28-2 MIGRATED to testing (Debian testing watch)
  • [2026-02-19] Accepted llm 0.28-2 (source all) into unstable (Debian FTP Masters) (signed by: Antoine Beaupré)
  • [2026-01-08] llm 0.28-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-05] Accepted llm 0.28-1 (source) into unstable (Antoine Beaupré)
  • [2025-08-21] llm 0.27.1-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-18] Accepted llm 0.27.1-1 (source) into unstable (Antoine Beaupré)
  • [2025-06-28] Accepted llm 0.26-1 (source) into experimental (Antoine Beaupré)
  • [2025-03-06] llm 0.23-1 MIGRATED to testing (Debian testing watch)
  • [2025-03-04] Accepted llm 0.23-1 (source) into unstable (Antoine Beaupré)
  • [2025-02-23] llm 0.22-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-20] Accepted llm 0.22-1 (source) into unstable (Antoine Beaupré)
  • [2025-02-07] llm 0.21-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-04] Accepted llm 0.21-1 (source) into unstable (Antoine Beaupré)
  • [2025-01-30] llm 0.20-1 MIGRATED to testing (Debian testing watch)
  • [2025-01-27] Accepted llm 0.20-1 (source) into unstable (Antoine Beaupré)
  • [2024-12-12] llm 0.19.1-1 MIGRATED to testing (Debian testing watch)
  • [2024-12-09] Accepted llm 0.19.1-1 (source) into unstable (Antoine Beaupré)
  • [2024-12-06] llm 0.19-1 MIGRATED to testing (Debian testing watch)
  • [2024-12-03] Accepted llm 0.19-1 (source) into unstable (Antoine Beaupré)
  • [2024-11-29] llm 0.18-1 MIGRATED to testing (Debian testing watch)
  • [2024-11-25] Accepted llm 0.18-1 (source) into unstable (Antoine Beaupré)
  • [2024-11-08] llm 0.17.1-1 MIGRATED to testing (Debian testing watch)
  • [2024-11-05] Accepted llm 0.17.1-1 (source) into unstable (Antoine Beaupré)
  • [2024-11-05] llm 0.16-1 MIGRATED to testing (Debian testing watch)
  • [2024-10-15] Accepted llm 0.16-1 (source) into unstable (Antoine Beaupré)
  • [2024-10-13] Accepted llm 0.14-1 (source all) into experimental (Debian FTP Masters) (signed by: Antoine Beaupré)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 1
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 0.28-2

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing