Git: User-assisted execution of arbitrary code — GLSA 202104-01

A vulnerability has been found in Git that could allow a remote attacker to execute arbitrary code.

Affected packages

dev-vcs/git on all architectures
Affected versions < 2.26.3
Unaffected versions >= 2.26.3

Background

Git is a distributed version control system designed.

Description

It was discovered that Git could be fooled into running remote code during a clone on case-insensitive file systems with support for symbolic links, if Git is configured globally to apply delay-capable clean/smudge filters (such as Git LFS).

Impact

A remote attacker could entice a user to clone a specially crafted repository, possibly resulting in the remote execution of arbitrary code with the privileges of the user running the application.

Workaround

There is no known workaround at this time.

Resolution

All Git users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-vcs/git-2.26.3"
 

References

Release date
April 30, 2021

Latest revision
April 30, 2021: 1

Severity
normal

Exploitable
local

Bugzilla entries